Seminaria
25.10.2017 12:00 Jakub Czarnowicz 
Podstawy Informatyki Chapter 3 of AN INTRODUCTION TO THE ANALYSIS OF ALGORITHMS by Robert Sedgewick, Philippe Flajolet 
25.10.2017 16:15 Bartłomiej Bosek 
Informatyka Teoretyczna A Tight Bound for Shortest Augmenting Paths on Trees 
The shortest augmenting path technique is one of the fundamental ideas used in maximum matching and maximum flow algorithms. Since being introduced by Edmonds and Karp in 1972, it has been widely applied in many different settings. Surprisingly, despite this extensive usage, it is still not well understood even in the simplest case: online bipartite matching problem on trees. In this problem a bipartite tree T=(W u B, E) is being revealed online, i.e., in each round one vertex from B with its incident edges arrives. It was conjectured by Chaudhuri et. al. that the total length of all shortest augmenting paths found is O(n log n). In this paper we prove a tight O(n log n) upper bound for the total length of shortest augmenting paths for trees improving over O(n log² n) bound.

26.10.2017 16:15 Wojciech Kruk 
Optymalizacja Kombinatoryczna Randomized PrimalDual Analysis of RANKING for Online Bipartite Matching 
We give a simple proof that the RANKING algorithm of Karp, Vazirani and Vazirani is 11/e competitive for the online bipartite matching problem. The proof is via a randomized primaldual argument. Primaldual algorithms have been successfully used for many online algorithm problems, but the dual constraints are always satisfied deterministically. This is the first instance of a nontrivial randomized primaldual algorithm in which the dual constraints only hold in expectation. 
08.11.2017 12:00 Miron Ficek 
Podstawy Informatyki Chapter 4 of AN INTRODUCTION TO THE ANALYSIS OF ALGORITHMS by Robert Sedgewick, Philippe Flajolet 
09.11.2017 16:15 Aleksandra Mędrek 
Optymalizacja Kombinatoryczna The Erdős discrepancy problem  Part I 
Terence Tao. The Erdős discrepancy problem. Discrete Analysis. Vol. 2, (2016), pp. 120. 
09.11.2017 17:00 Marcin Muszalski 
Optymalizacja Kombinatoryczna The Erdős discrepancy problem  Part II 
Terence Tao. The Erdős discrepancy problem. Discrete Analysis. Vol. 2 (2016), pp. 120. 
15.11.2017 12:00 Hanna Palianytsia i Agnieszka Rabiej 
Podstawy Informatyki Chapter 4.5  4.9 of AN INTRODUCTION TO THE ANALYSIS OF ALGORITHMS by Robert Sedgewick, Philippe Flajolet 
16.11.2017 16:15 Anna Kobak 
Optymalizacja Kombinatoryczna The Erdős discrepancy problem  Part III 
Terence Tao. The Erdős discrepancy problem. Discrete Analysis. Vol. 2 (2016), pp. 120. 
16.11.2017 17:00 Grzegorz Jurdziński 
Optymalizacja Kombinatoryczna The Erdős discrepancy problem  Part IV 
Terence Tao. The Erdős discrepancy problem. Discrete Analysis. Vol. 2 (2016), pp. 120. 
22.11.2017 12:00 Michał Ziobro 
Podstawy Informatyki Chapter 5 of AN INTRODUCTION TO THE ANALYSIS OF ALGORITHMS by Robert Sedgewick, Philippe Flajolet 
23.11.2017 16:15 Gabriel Jakóbczak 
Optymalizacja Kombinatoryczna TBA (23 XI) 
29.11.2017 12:00 Filip Bartodziej 
Podstawy Informatyki Chapter 6.1  6.7 of AN INTRODUCTION TO THE ANALYSIS OF ALGORITHMS by Robert Sedgewick, Philippe Flajolet 
30.11.2017 16:15 Mateusz Krawiec 
Optymalizacja Kombinatoryczna TBA (30 XI a) 
30.11.2017 17:00 Krzysztof Maziarz 
Optymalizacja Kombinatoryczna TBA (30 XI b) 
06.12.2017 12:00 Katarzyna Bułat 
Podstawy Informatyki Chapter 6.8  6.11 of AN INTRODUCTION TO THE ANALYSIS OF ALGORITHMS by Robert Sedgewick, Philippe Flajolet 
07.12.2017 16:15 Jan Derbisz 
Optymalizacja Kombinatoryczna TBA (7 XII a) 
07.12.2017 17:00 Franciszek Stokowacki 
Optymalizacja Kombinatoryczna TBA (7 XII b) 
13.12.2017 12:00 Katarzyna Grzybowska 
Podstawy Informatyki Chapters 6.12  6.15 of AN INTRODUCTION TO THE ANALYSIS OF ALGORITHMS by Robert Sedgewick, Philippe Flajolet 
14.12.2017 16:15 Lev Deliatynskyi 
Optymalizacja Kombinatoryczna TBA (14 XII a) 
14.12.2017 17:00 Jakub Nowak 
Optymalizacja Kombinatoryczna TBA (14 XII b) 
20.12.2017 12:00 Rafał Burczyński 
Podstawy Informatyki Chapters 7.1  7.5 of AN INTRODUCTION TO THE ANALYSIS OF ALGORITHMS by Robert Sedgewick, Philippe Flajolet 
21.12.2017 16:15 Paweł Kubiak 
Optymalizacja Kombinatoryczna TBA (21 XII a) 
21.12.2017 17:00 Jakub Rówiński 
Optymalizacja Kombinatoryczna TBA (21 XII b) 
03.01.2018 12:00 Dawid Pyczek i Jakub Rowiński 
Podstawy Informatyki Chapters 7.6  7.9 of AN INTRODUCTION TO THE ANALYSIS OF ALGORITHMS by Robert Sedgewick, Philippe Flajolet 
04.01.2018 16:15 Grzegorz Bukowiec 
Optymalizacja Kombinatoryczna TBA (4 I) 
10.01.2018 12:00 Kamil Rajtar 
Podstawy Informatyki Chapters 8.1  8.4 of AN INTRODUCTION TO THE ANALYSIS OF ALGORITHMS by Robert Sedgewick, Philippe Flajolet 
11.01.2018 16:15 Maciej Woźniak 
Optymalizacja Kombinatoryczna TBA (11 I a) 
11.01.2018 17:00 Dawid Pyczek 
Optymalizacja Kombinatoryczna TBA (11 I b) 
17.01.2018 12:00 Bartłomiej Puget i Dominika Salawa 
Podstawy Informatyki Chapters 8.5  8.9 of AN INTRODUCTION TO THE ANALYSIS OF ALGORITHMS by Robert Sedgewick, Philippe Flajolet 
18.01.2018 16:15 Jarek Duda 
Optymalizacja Kombinatoryczna Some nonstandard approaches to hard computational problems 
I will talk about nonstandard approaches to some problems for which there is not known polynomial time classical algorithm. I will start with briefly explaining mechanism used in Shor algorithm and the problem with global optimization formulations used in adiabatic quantum computers. Then show some perspectives on the subsetsum NP complete problem, like geometric, integration and divergence formulations. Then show how Grassmann variables would be useful for the Hamilton cycle problem. Finally discuss the difficulty of the graph isomorphism problem on the most problematic cases: strongly regular graphs, and algebraic perspective on this problem. Jarek Duda. Some unusualapproaches to hard computational problems. slides. 
Poprzednie referaty
19.10.2017 16:15 Sylwester Klocek 
Optymalizacja Kombinatoryczna Online bipartite matching made simple 
We examine the classic online bipartite matching problem studied by Richard M. Karp, Umesh V. Vazirani, and Vijay V. Vazirani. Algorithm attempts to match online new vertices with edges. Such a decision, once made, is irrevocable. The objective is to maximize the size of the resulting matching. We will see a sketch of simple proof of their result that the Ranking algorithm for this problem achieves a competitive ratio of 1 − 1/e. B.E. Birnbaum, C. Mathieu. Online bipartite matching made simple. SIGACT News 39 (1), 8087, 2008. 
18.10.2017 12:00 Piotr Wójcik 
Podstawy Informatyki Chapter 4 of Flajolet book "Complex Analysis, Rational and Meromorphic Asymptotic". 
12.10.2017 16:15 Zygmunt Łenyk 
Optymalizacja Kombinatoryczna Handwritten graph diagrams recognition 
Graph visualisation problem is well known and there are many solutions to it. The reverse process  graph recognition  has been disregarded so far. Such solution has wide applications  from scientific to didactic. This paper focuses on handwritten graphs. Objects do not necessarily have regular shapes and there might be a lot of noise. Using computer vision techniques, we recognize first vertices and then edges. The result of the algorithm is a list of edges and a generated graph visualisation. 
11.10.2017 12:00 Tomasz Kisielewski 
Podstawy Informatyki Logic of Provability by George Boolosa 
Short presentantion of the book Logic of Provability by George Boolos. 
05.10.2017 16:15 Szymon Borak 
Optymalizacja Kombinatoryczna On some problems in planar graphs 
We give insight into competitive reachability for outerplanar graphs and also for other classes of graphs with bounded degree. Competitive reachability is a game where two players orient the edges of undirected graph G alternately until all edges of G have been oriented. One player wants to minimize the number of ordered pairs of distinct vertices (x, y) with a directed path from x to y. And the second want to maximize it. Furthermore we focus on harmonious coloring conjecture for outerplanar graphs and further attempts in this area. A harmonious coloring of a graph G is a proper vertex coloring of G in which every pair of colors appears on adjacent vertices at most once. The harmonious chromatic number, denoted by h(G), is the minimum number of colors in a harmonious coloring. Analogically we define harmonious edge coloring in which every pair of colors appears on incident edges at most once. The minimal number of color we denote by h'(G). The conjecture states that h(G)<=h'(G). Finally we tackle the hamiltonian cycles in grid graphs. Grid graph are finite vertex induced subsets of infinite lattice, composed from unitside squares, equilateral triangles or equilateral hexagons. Decide whether the grid graph has hamiltonian cycle is NPhard in general. 
04.10.2017 12:15 Tomasz Kisielewski 
Podstawy Informatyki Logic of Provability by George Boolosa 
Short presentantion of the book Logic of Provability by George Boolos.

21.06.2017 16:15 Damian Goik 
Informatyka Teoretyczna Succinct progress measures for solving parity games 
The recent breakthrough paper by Calude et al. has given the first algorithm for solving parity games in quasipolynomial time, where previously the best algorithms were mildly subexponential. We devise an alternative quasipolynomial time algorithm based on progress measures, which allows us to reduce the space required from quasipolynomial to nearly linear. Our key technical tools are a novel concept of ordered tree coding, and a succinct tree coding result that we prove using bounded adaptive multicounters, both of which are interesting in their own right. Based on the paper:

14.06.2017 16:15 Piotr Wójcik 
Informatyka Teoretyczna On the asymptotic density of valid sentences in firstorder logic about one binary relation 
This study arises from the following question: what is the proportion of tautologies of the given length n among the number of all FO relational sentences of length n? We investigate the simplest language with a fixed signature σ = {r}, where r is a binary relation symbol. The model with four logic symbols and an universal quantifier lead us to discover an unexpected result  the fraction of valid sentences is always greater than a fixed constant and therefore the density, if exists, is positive. The main theorem is derived from the analysis of structural properties of FO formulae, which themselves bear strict resemblance to structural properties of λterms. 
13.06.2017 14:15 Kamil Sałaś 
Kryptologia Helios: Webbased OpenAudit Voting 
The talk is based on the paper by Ben Adida with the same title [1]. In addition, we recall ElGamal encryption scheme and zeroknwoledge proofs. Voting with cryptographic auditing, sometimes called openaudit voting, has remained, for the most part, a theoretical endeavor. In spite of dozens of fascinating protocols and recent groundbreaking advances in the field, there exist only a handful of specialized implementations that few people have experienced directly. As a result, the benefits of cryptographically audited elections have remained elusive. We present Helios, the first webbased, openaudit voting system. Helios is publicly accessible today: anyone can create and run an election, and any willing observer can audit the entire process. Helios is ideal for online software communities, local clubs, student government, and other environments where trustworthy, secretballot elections are required but coercion is not a serious concern. With Helios, we hope to expose many to the power of openaudit elections. References [1] Ben Adida, Helios: Webbased OpenAudit Voting, Proceedings of the 17th Conference on Security Symposium, 2008, pp. 335348 
07.06.2017 12:15 Jakub Nowak 
Podstawy Informatyki Generic Complexity of Presburger Arithmetic by Alexander N. Rybalov 
Fischer and Rabin proved in that the decision problem for Presburger Arithmetic has at least double exponential worstcase complexity (for deterministic and nondeterministic Turing machines). In paper 4 a theory of genericcase complexity was developed, where algorithmic problems are studied on "most" inputs instead of set of all inputs. An interesting question rises about existing of more efcient (say, polynomial) generic algorithm deciding Presburger Arithmetic on some set of closed formulas of asymptotic density 1 (socalled generic set). We prove, however, that there is not even an exponential generic algorithm working correctly on a set of inputs which (socalled strongly generic set). 
01.06.2017 16:15 Wojciech Kruk, Piotr Kruk 
Optymalizacja Kombinatoryczna Ulam Sequences and Ulam Sets 
The Ulam sequence is given by a1=1,a2=2, and then, for n≥3, the element an is defined as the smallest integer that can be written as the sum of two distinct earlier elements in a unique way. This gives the sequence 1,2,3,4,6,8,11,13,16,…, which has a mysterious quasiperiodic behavior that is not understood. Ulam's definition naturally extends to higher dimensions: for a set of initial vectors {v1,…,vk}⊂ℝn, we define a sequence by repeatedly adding the smallest elements that can be uniquely written as the sum of two distinct vectors already in the set. The resulting sets have very rich structure that turns out to be universal for many commuting binary operations. We give examples of different types of behavior, prove several universality results, and describe new unexplained phenomena.

31.05.2017 16:15 Piotr Micek 
Informatyka Teoretyczna Ramsey Theory for Binary Trees and the Separation of Treechromatic Number from Pathchromatic Number 
We propose a Ramsey theory for binary trees and prove that for every rcoloring of "strong copies" of a small binary tree in a huge complete binary tree T, we can find a strong copy of a large complete binary tree in T with all small copies monochromatic. As an application, we construct a family of graphs which have treechromatic number at most 2 while the pathchromatic number is bounded. This construction resolves a problem posed by Seymour. Joint work with Fidel BarreraCruz, Stefan Felsner, Tamás Mészáros, Heather Smith, Libby Taylor, and Tom Trotter. 
31.05.2017 12:15 Grzegorz Bukowiec 
Podstawy Informatyki The Undecidability of the Generalized Collatz Problem by Stuart A. Kurtz and Janos Simon 
The Collatz problem, widely known as the 3x + 1 problem, asks whether or not a certain simple iterative process halts on all inputs. In this paper, we build on work of J. H. Conway to show that a natural generalization of the Collatz problem is $PI^0_2$ complete. 
30.05.2017 14:15 Jan Derbisz 
Kryptologia Subquadratic Greatest Common Divisor 
The binary algorithm is a variant of the Euclidean algorithm that performs well in practice. We present a quasilinear time recursive algorithm that computes the greatest common divisor of two integers by simulating a slightly modified version of the binary algorithm. The structure of the algorithm is very close to the one of the wellknown KnuthSchonhage fast gcd algorithm; although it does not improve on its O(M(n) log n) complexity, the description and the proof of correctness are significantly simpler. This leads to a simplification of the implementation and to better running times. 
25.05.2017 16:15 Sylwester Klocek, Maciej Woźniak 
Optymalizacja Kombinatoryczna On the complexity of the chipfiring reachability problem 
In this paper, we study the complexity of the chipfiring reachability problem. We show that for Eulerian digraphs, the reachability problem can be decided in polynomial time, even if the digraph has multiple edges. We also show a special case when the reachability problem can be decided in polynomial time for general digraphs: if the target distribution is recurrent restricted to each strongly connected component. Both of these algorithms are strongly polynomial. As a further positive result, we show that the chipfiring reachability problem is in coNP for general digraphs. We also show that the chipfiring halting problem is in coNP for Eulerian digraph 
24.05.2017 12:15 Piotr Wójcik 
Podstawy Informatyki Randombit optimal uniform sampling for rooted planar trees with given sequence of degrees and Applications by O.Bodini, J. David, and Ph. Marchal 
In this paper, we redesign and simplify an algorithm due to Remy et al. for the generation of rooted planar trees that satisfies a given partition of degrees. This new version is now optimal in terms of random bit complexity, up to a multiplicative constant. We then apply a natural process “simulateguessandproof” to analyze the height of a random Motzkin in function of its frequency of unary nodes. When the number of unary nodes dominates, we prove some unconventional height phenomenon. 
23.05.2017 14:15 Szymon Policht 
Kryptologia Supersingular isogeny key exchange 
Supersingular isogeny is the newest addition to the postquantum cryptography roster. It is elliptic curve based, but unlike tradidional ECC algorithms, it's quantum resistant. It offers significant key size reduction and computation time speedup compared to other postquantum algorithms. 
18.05.2017 16:15 Katrzyna Janocha 
Optymalizacja Kombinatoryczna Proper Orientations of Planar Bipartite Graphs 
An orientation of a graph G is proper if any two adjacent vertices have different indegrees. The proper orientation number χ (G) of a graph G is the minimum of the maximum indegree, taken over all proper orientations of G. In this paper, we show that a connected bipartite graph may be properly oriented even if we are only allowed to control the orientation of a specific set of edges, namely, the edges of a spanning tree and all the edges incident to one of its leaves. As a consequence of this result, we prove that 3connected planar bipartite graphs have proper orientation number at most 6. Additionally, we give a short proof that χ (G) ≤ 4, when G is a tree and this proof leads to a polynomialtime algorithm to proper orient trees within this bound. 
16.05.2017 14:15 
Kryptologia Dzień Magistranta (sala 0004) 
11.05.2017 16:15 Anna Kobak 
Optymalizacja Kombinatoryczna Lambda number for the direct product of some family of graphs 
An L(2,1) labeling for a graph G = (V,E) is a function f on V such that  f(u)  f(v) >= 2 if u,v are adjacent and f(u), f(v) are distinct if u,v are vertices of distance two. The lambda(G) for G is the minimum span over all L(2,1) labelings of G. We will show that when m>=6 and n>=3, lambda(Pm x Cn) = 7 if and only if n is not a multiple of 7 and also provide the conditions on m and n such that lambda(Cm x Cn) <= 7. 
10.05.2017 16:15 Torsten Ueckerdt Karlsruhe Institute of Technology 
Informatyka Teoretyczna The kStrong Induced Arboricity of a Graph 
Motivated by a connection to vertexdistinguishing colorings, we initiate the study of a new graph covering parameters: The kstrong induced arboricity. For a graph G and a positive integer k, a kstrong induced forest F in G is an induced forest in which every component has at least k edges. An edge in G is called kvalid if it is contained in at least one kstrong induced forest. The kstrong induced arboricity f_{k}(G) is the smallest number m such that all kvalid edges of G can be covered with m kstrong induced forests in G. 
10.05.2017 12:15 Maciej Bendkowski 
Podstawy Informatyki Analytic combinatorics: an introduction 
In our talk we outline the main concepts and techniques of analytic combinatorics used to investigate properties of large random algebraic structures. We discuss the central interpretation of generating functions as functions analytic at the origin allowing to relate their analytic properties with the quantitative properties of studied structures. Finally, we briefly excerpt the techniques of singularity analysis allowing us to access the asymptotic form of corresponding counting sequences or investigate the probability distribution of interesting combinatorial parameters.

09.05.2017 14:15 Aleksandra Nowak 
Kryptologia The Fully Homomorphic Encryption and Approximate Greatest Common Divisor Problem 
We briefly introduce the definition of fully homomorphic encryption and describe the two main problems on which are based latest FHE schemes: The LWE/RingLWE and AGCD problems. We discuss their advantages and the relations between them. We present the definition of bootstrapping and investigate the FHE scheme based on the AGCD problem as published in [1]. References [1] J. H. Cheon, D. Stehlé, Fully Homomorphic Encryption over the Integers Revisited, EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques, pp. 2443. 
04.05.2017 16:15 Grzegorz Bukowiec 
Optymalizacja Kombinatoryczna Even factors of graphs 
An even factor of a graph is a spanning subgraph in which each vertex has a positive even degree. It has been shown that if a graph G has an even factor, it also has an even factor F such that E(F) >= 4/7 (E(G) + 1). 4/7 is the best possible ratio here, but we will try to strengthen this lower bound by taking the set of vertices of degree 2 into consideration. 
27.04.2017 16:15 Jakub Szarawski 
Optymalizacja Kombinatoryczna A greedy approach to the Turtle Tower problem 
In the Turtle Tower problem we are given n turtles with a mass and capacity for each of them. We are looking for the highest tower possible, regarding that capacity of every turtle in the tower cannot be exeeded by the sum of the masses of turles it carry. Presented solution is faster than commonly known dynamic one. 
26.04.2017 16:15 Marcin Pilipczuk University of Warsaw 
Informatyka Teoretyczna Subexponential Parameterized Algorithms for Planar Graphs, ApexMinorFree Graphs and Graphs of Polynomial Growth via Low Treewidth Pattern Covering 
We prove the following theorem. Given a planar graph G and an integer k, it is possible in polynomial time to randomly sample a subset A of vertices of G with the following properties: 1) A induces a subgraph of G of treewidth 2) for every connected subgraph H of G on at most k vertices, the probability that A covers the whole vertex set of H is at least Together with standard dynamic programming techniques for graphs of bounded treewidth, this result gives a versatile technique for obtaining (randomized) subexponential parameterized algorithms for problems on planar graphs, usually with running time bound In the talk I will first focus on the background and motivation, and then highlight the main ideas of the proof by sketching the proof for the case of graph classes of polynomial growth. Based on joint work with Fedor Fomin, Daniel Lokshtanov, Dániel Marx, Michał Pilipczuk, and Saket Saurabh: http://arxiv.org/abs/1604.05999 and http://arxiv.org/abs/1610.07778. 
26.04.2017 12:15 Konrad Kalita 
Podstawy Informatyki Java Generics are Turing Complete by Radu Grigore 
This paper describes a reduction from the halting problem of Turing machines to subtype checking in Java. It follows that subtype checking in Java is undecidable, which answers a question posed by Kennedy and Pierce in 2007. It also follows that Java’s type checker can recognize any recursive language, which improves a result of Gil and Levy from 2016. The latter point is illustrated by a parser generator for fluent interfaces. 
25.04.2017 14:15 Michał Ziobro 
Kryptologia Introduction to Homomorphic Encryption 
The talk is divided into two parts. In the first part we briefly introduce Fully Homomorphic Encryption and a presentation of a classic example described in [1]. In the second part, we bring up a subject of partially homomorphic encrytpion schemes over finite fields, presented in [2]. References: [1] C. Gentry, Computing Arbitrary Functions of Encrypted Data, 2008 (pdf) 
20.04.2017 16:15 Helena Borak, Zygmunt Łenyk 
Optymalizacja Kombinatoryczna Necklaces, Convolutions, and X + Y, A new upper bound for the online square packing 
Necklaces, Convolutions, and X + Y The necklace alignment problem is to find the optimal rotation of the necklaces to best align the beads, when we have two necklaces given, each with n beads at arbitrary positions. Alignment is measured according to the ℓ_p norm of the vector of distances between pairs of beads from opposite necklaces in the best perfect matching. We show surprisingly different results for p = 1, p even, and p = ∞ and how these problems can be reduced to convolution problems which can be solve in subquadratic time. Besides, we say how the necklace alignment problems, and their corresponding convolution problems, are also intrinsically connected to problems on X + Y matrices. A new upper bound for the online square packing In online square packing problem we try to minimise the height of squares on a plane with width 1. Squares come one by one, they can’t overlap and once set, it’s position can’t be changed. A new upper bound (ratio between algorithm result and optimal packing) is found by applying modified version of previously used First Fit Shelf algorithm. 
19.04.2017 16:15 Lech Duraj, Adam Polak 
Informatyka Teoretyczna Longest Common Strictly Increasing Subsequecnce 
The Longest Common Increasing Subsequence problem is a variant of classic Longest Common Subsequence problem, which can be solved in quadratic time with a simple dynamic programming algorithm. During the talk we will show a reduction from the Orthogonal Vectors problem to the Longest Common Increasing Subsequence problem which proves that the latter cannot be solved in strongly subquadratic time unless the SETH is false.
Simple modifications of the reduction prove that the problem for k sequences cannot be solved in O(n^{k}^{ε}) time, that the same lower bounds apply to the Longest Common Weakly Increasing Subsequence, and that the assumption of SETH can be replaced with a weaker statement about satisfiability of nondeterministic branching programs. 
12.04.2017 12:15 Jarek Duda 
Podstawy Informatyki Boundaries for hashing problem, or how many bits ones individuality costs 
I will talk about informationtheoretic boundaries for the hashing problem, the Bloom filter, and generally about informational content of structures like trees and graphs. While the label size has to grow like logarithm of the population size, neglecting information about the order (lg(n!) bits), we get a linear growth of entropy of population, allowing to bound 'the cost of individuality' asymptotically to ~2.33275 bits per object. 
06.04.2017 16:15 Andrzej Głuszyński, Jakub Nowak 
Optymalizacja Kombinatoryczna Local Antimagic Vertex Coloring of a Graph, A short proof of Cayley's tree formula 
Local Antimagic Vertex Coloring of a Graph The edge labelling is called 'local antimagic', if for all vertices sum of labels for incident edges is different for every two adjacent vertices. Such sum induce a correct vertex colouring. The local antimagic chromatic number  X_la(G)  is the minimum number of colours used by any proper local antimagic labelling. In the paper authors present results on this parameter for trees, friendship, wheel and clique graphs. A short proof of Cayley's tree formula Cayley’s tree formula is a very elegant result in Graph Theory. The problem is to find the number of all possible trees on a given set of labeled vertices. For n = 2 and vertex set {v1, v2}, we have only one tree. For n = 3 and vertex set {v1, v2, v3}, we have 3 different trees. Similarly for n = 4, we have 16 trees. We give a short proof of Cayley’s tree formula for counting the number of different labeled trees on n vertices. Alok Bhushan Shukla, A short proof of Cayley's tree formula. 
05.04.2017 12:15 Szymon Stankiewicz 
Podstawy Informatyki CANTOR POLYNOMIALS AND THE FUETERPOLYA THEOREM by MELVYN NATHANSON 
A packing polynomial is a polynomial that maps the set N^2 of lattice points with nonnegative coordinates bijectively onto N. Cantor constructed two quadratic packing polynomials, and Fueter and Polya proved analytically that the Cantor polynomials are the only quadratic packing polynomials. 
04.04.2017 14:15 Mateusz Jachna 
Kryptologia Secure Hash Algorithms family and the recently found collision for SHA1 
28.03.2017 14:15 Piotr Wójcik 
Kryptologia Quantum Authentication with Key Recycling 
We show that a family of quantum authentication protocols introduced in FOCS 2002 can be used to construct a secure quantum channel and additionally recycle all of the secret key if the message is successfully authenticated, and recycle part of the key if tampering is detected. We give a full security proof that constructs the secure channel given only insecure noisy channels and a shared secret key. We also prove that the number of recycled key bits is optimal for this family of protocols, i.e., there exists an adversarial strategy to obtain all nonrecycled bits. Previous works recycled less key and only gave partial security proofs, since they did not consider all possible distinguishers (environments) that may be used to distinguish the real setting from the ideal secure quantum channel and secret key resource. References: [1] Christopher Portmann, Quantum Authentication with Key Recycling (pdf) 
23.03.2017 16:15 Aleksandra Mędrek, Marcin Muszalski 
Optymalizacja Kombinatoryczna Planning for Fast Connectivity Updates 
Understanding how a single edge deletion can affect the connectivity of a graph amounts to finding the graph bridges. But when faced with d > 1 deletions, can we establish as easily how the connectivity changes? When planning for an emergency, we want to understand the structure of our network ahead of time, and respond swiftly when an emergency actually happens. We describe a linearspace representation of graphs which enables us to determine how a batch of edge updates can impact the graph. Given a set of d edge updates, in time O(d polylg n) we can obtain the number of connected components, the size of each component, and a fast oracle for answering connectivity queries in the updated graph. The initial representation is polynomialtime constructible. 
21.03.2017 14:15 Jan Szczepaniec 
Kryptologia Inclusive Block Chain Protocols 
Distributed cryptographic protocols such as Bitcoin and Ethereum use the block chain to synchronize a global log of events between nodes in their network. Previous research has shown that the mechanics of the block chain and block propagation are constrained: if blocks are created at a high rate compared to their propagation time in the network, many conflicting blocks are created and performance suffers greatly.

16.03.2017 16:15 Patryk Urbański 
Optymalizacja Kombinatoryczna Generating Linear Extensions Fast 
One of the most important sets associated with a poset P is its set of linear extensions, E(P). In this paper, we present an algorithm to generate all of the linear extensions of a poset in constant amortized time; that is, in time O(e(P)), where e(P) = E(P). The fastest previously known algorithm for generating the linear extensions of a poset runs in time O(n*e(P)), where n is the number of elements of the poset. Our algorithm is the first constant amortized time algorithm for generating a ``naturally defined'' class of combinatorial objects for which the corresponding counting problem is #Pcomplete. Furthermore, we show that linear extensions can be generated in constant amortized time where each extension differs from its predecessor by one or two adjacent transpositions. The algorithm is practical and can be modified to efficiently count linear extensions, and to compute P(x < y), for all pairs x,y, in time O(n^2 + e(P)). 
16.03.2017 14:15 Jakub Cisło, Grzegorz Jurdziński 
Algorytmika Tight Hardness Results for LCS and other Sequence Similarity Measures 
15.03.2017 16:15 Manuel Bodirsky TU Dresden 
Informatyka Teoretyczna The tractability conjecture for finitely bounded homogeneous structures 
Finitely bounded homogeneous structures form a large class of infinite structures that can be seen as a generalisation of the class of all finite structures. Many results about finite structures, in particular in the context of the complexity of constraint satisfaction problems, can be generalised to this larger class. In this talk I will present a reformulation of a tractability conjecture for CSPs for this class in terms of polymorphisms, due to Barto and Pinsker (LICS 2016), and I will present a proof that the condition given in the tractability conjecture is decidable (under some Ramseytheoretic assumptions that might hold in general for all reducts of finitely bounded homogeneous structures). 
15.03.2017 12:15 Łukasz Lachowski 
Podstawy Informatyki Impossibility of Distributed Consensus with One Faulty Process by MICHAEL J. FISCHER, NANCY A. LYNCH AND MICHAEL S. PATERSO 
The consensus problem involves a asynchronous system of processes, some of which may be unreliable.The problem is for the reliable processes to agree on a binary value. In this paper, it is shown that every protocol for this problem has the possibility of nontermination, even with only one faulty process. By way of contrast, solutions are known for the synchronous case, the “Byzantine Generals” problem. 
14.03.2017 14:15 Marcin Briański 
Kryptologia NonInteractive Verifiable Computing: Outsourcing Computation to Untrusted Workers 
The talk is based on the paper with the same title by Rosario Gennaro, Craig Gentry and Bryan Parno. Verifiable Computation enables a computationally weak client to "outsource" the computation of a function F on various inputs x_{1}, ..., x_{k} to one or more workers. The workers return the result of the function evaluation, e.g., y_{i} = F(x_{i}), as well as a proof that the computation of F was carried out correctly on the given value x_{i}. The verification of the proof should require substantially less computational effort than computing F(x_{i}) from scratch. We present a protocol that allows the worker to return a computationally sound, noninteractive proof that can be verified in O(m) time, where m is the bitlength of the output of F. The protocol requires a onetime preprocessing stage by the client which takes O(C) time, where C is the smallest Boolean circuit computing F. Our scheme also provides input and output privacy for the client, meaning that the workers do not learn any information about the values x_{i} or y_{i}. 
09.03.2017 16:15 Grzegorz Matecki 
Optymalizacja Kombinatoryczna Boolean dimension of posets 
A boolean dimension bdim(P) of a poset P=(X,<) is a smallest number k for which there is a set l1, l2, ..., lk of labelings X:>N and a boolean formula f(a1, ..., ak) such that the following is true: x < y in P iff f(a1, .., a_k) = 1 where ai =1 iff li(x) < li(x). Generally, it is simple to observe that bdim(P) <= dim(P). Also, it is known that there is a constant c such that bdim(n) <= c log(n) for any poset P of size n. The are few interesting open problems for boolean dimension: 1) Is boolean dimension of the boolean lattice of size n less that n? 2) Is there a constant c such that bdim(P) < c for any planar poset P? 
09.03.2017 14:00 Sylwester Klocek, Wojciech Kruk 
Algorytmika The Alternating Stock Size Problem and the Gasoline Puzzle 
08.03.2017 12:15 Maciej Bendkowski 
Podstawy Informatyki Boltzmann samplers: random generation of combinatorial structures with an application to lambda calculus 
In their seminal paper, Duchon et al. proposed a surprisingly simple, generalpurpose framework of Boltzmann samplers meant for random generation of combinatorial structures. In this talk we revisit their method and discuss its elegant relation with analytic combinatorics as well as important practical implementation details. Finally, we discuss the application of Boltzmann samplers to the random generation of lambda terms used, e.g. in testing functional programming compilers. 
07.03.2017 14:15 Zygmunt Łenyk 
Kryptologia Speeding up modular multiplication using Montgomery and Barrett reduction 
In the talk we present Montgomery and Barrett reductions that are used to speed up modular computations. In both reductions some precomputations are made allowing for replacing subsequent expensive divisions by some fixed modulus with much cheaper operations involving a suitable power of 2. This is particularly useful when many modular divisions by the same modulus are performed (for example in finite field arithmetic or in RSA). 
07.03.2017 14:15 Mateusz Twaróg, Łukasz Majcher 
Optymalizacja Kombinatoryczna Combinatorial library core 
Presentation and discussion on core functionalities of the c++ combinatorial library. introduction to classes representing graphs, graph traversing algorithm templates and simple GUI. 
01.03.2017 12:15 Michał Zwonek 
Podstawy Informatyki Wielomianowe kodowania 
Rozważany będzie problem istnienia wielomianowej bijekcji, najniższego stopnia, między N^k, a N. Przedstawione będą także problemy otwarte związane z tą tematyką. Materiały do wystąpienia: 1) Elementarny dowód Twierdzenie FeuterPolya (jedyny kwadratowy i bijektywny wielomian N^2>N to funkcja cantore'a) https://arxiv.org/abs/1512. 2) Praca, w której autorzy pokazują nieistnienie wielomianów 3 i 4 stopnia. http://www.sciencedirect.com/ 3) Praca podobnie tematyczna odnosząca się do problemu istnienia wielomianów bijektywnych z pewnego sektora N^2 w N. (To o czym wspomniałem na koniec, opis tego problemu jest też pod koniec w 1) ). Pod koniec pracy jest opisane 6 problemów otwartych związanych z tą tematyką. https://arxiv.org/abs/1305. 4) W podobnej tematyce. http://www.sciencedirect.com/science/article/pii/0022314X78900355

28.02.2017 Michał Dyrek 
Kryptologia LLL algorithm and its applications in Number Theory and Cryptography 
The talk is devoted to the algorithm by A. Lenstra, H. Lenstra and L. Lovász dated 1982 allowing for approximation of Shortest Vector Problem in polynomial time. We will present the idea of the algorithm and highlight its applications such as factoring polynomials over Q, constructing polynomials with small coefficients and connections with attacks on RSA. 
26.01.2017 16:15 Wojciech Kruk, Maciej Woźniak 
Optymalizacja Kombinatoryczna A few open problems 
We mentioned the following open problems in graph theory and discrepancy theory: 1. Erdos discrepancy problem 2. Hoang  Reed conjecture 3. Seagull problem  a consequence of Hadwiger's conjecture 
 Strona Główna
 Katedra Algorytmiki
 Katedra Podstaw Informatyki
 Wydział Matematyki i Informatyki
 Kontakt
 Satori
 Reports on Mathematical Logic
 Forum TCS
 UsosWeb
 Informatyka na szlaku
 Galeria
 Ludzie
 Maciej Bendkowski
 Szymon Borak
 Bartłomiej Bosek
 Iwona Cieślik
 Piotr Danilewski
 Lech Duraj
 Adam Gągol
 Monika Gillert
 Katarzyna Grygiel
 Jarosław Grytczuk
 Grzegorz Guśpiel
 Grzegorz Gutowski
 Grzegorz Herman
 Leszek Horwath
 Pawel M. Idziak
 Tomasz Kisielewski
 Karol Kosiński
 Marcin Kozik
 Jakub Kozik
 Tomasz Krawczyk
 Jacek Krzaczkowski
 Łukasz Lachowski
 Wojciech Lubawski
 Agnieszka Łupińska
 Grzegorz Matecki
 Piotr Micek
 Patryk Mikos
 Andrzej Pezarski
 Adam Polak
 Michał Staromiejski
 Piotr Szafruga
 Maciej Ślusarek
 Bartosz Walczak
 Piotr Wójcik
 Michał Wrona
 Marek Zaionc
 Michał Zmarz
 Byli współpracownicy