In the last couple of years a pressing question has started to permeate the mathematical community: how will mathematicians’ jobs coexist harmoniously with AI as it gets progressively better at mathematics? “A.I. Is Coming for Mathematics, Too” was the title chosen by the NY Tim…
Modern computer systems are fast—until they are not.
The memory channel bandwidth between DRAM and the CPU has been far behind the CPU performance for more than three decades, and the gap between their performances (called the Memory Wall) is larger than ever nowadays.
This has b…
Hyperparameter tuning is critical to the success of cross-device federated learning applications. Unfortunately, federated networks face issues of scale, heterogeneity, and privacy; addressing these issues with standard techniques (client subsampling and differential privacy) int…
For years, interpretability research in machine learning has been guided by a “microscope” metaphor: if we zoom in far enough on neurons and circuits, perhaps we can reverse-engineer how models think. This bottom-up program, rooted in the search for mechanistic detail, has yield…
Imagine that you program satellites for NASA that orbit the moon. These satellites are programmed remotely from Earth as the inaccessibility of space makes manual device maintenance (e.g. regular battery replacement) infeasible. Instead of batteries, these satellites are equipped…
Picture this. It’s a warm summer evening. After a long day, your roommate and you settle down on the couch to indulge
your respective Internet-fueled pastimes. You’ve pulled up undeniably adorable cat videos on YouTube, and your roommate
is catching up on the latest episode of he…
In this blog post, I will explain a series of 3 papers, where the third one gives the first construction of explicit constant-degree lossless vertex expanders.
[HMMP24] Explicit two-sided unique-neighbor expanders. With Theo McKenzie, Sidhanth Mohanty, Pedro Paredes.
STOC, 2024…
Paper assignment is crucial in conference peer review as we need to ensure that papers receive high-quality reviews and reviewers are assigned papers that they are willing and able to review. Moreover, it is essential that a paper-matching process mitigates potential malicious b…
Data structures contain two important aspects that computer scientists seek to verify: behavior and cost.
The behavior of data structures has long been studied using abstraction functions, which translate concrete data structure representations into a semantic representation.
On …
Since the development of the first database management systems (DBMSs) over five decades ago, DBMSs
have become the foundation of modern data-intensive applications. However, deploying and
maintaining a DBMS for these applications is more challenging now than ever. Such applicat…