{"id":1682,"date":"2024-10-02T19:19:42","date_gmt":"2024-10-02T19:19:42","guid":{"rendered":"https:\/\/focs.computer.org\/2024\/?page_id=1682"},"modified":"2024-12-04T17:44:34","modified_gmt":"2024-12-04T17:44:34","slug":"plenary-talks","status":"publish","type":"page","link":"https:\/\/focs.computer.org\/2024\/plenary-talks\/","title":{"rendered":"Plenary Talks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1682\" class=\"elementor elementor-1682\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-75045a7 e-grid e-con-boxed e-con e-parent\" data-id=\"75045a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41f0f25 elementor-widget elementor-widget-heading\" data-id=\"41f0f25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Plenary Talks<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-cfd27ae elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cfd27ae\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-603e0ef\" data-id=\"603e0ef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-defbd3d elementor-widget elementor-widget-heading\" data-id=\"defbd3d\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"p1\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Plenary 1 (Roger Myerson, 10:50am-12:00pm, Monday, October 28)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-18d34f0 e-grid e-con-boxed e-con e-parent\" data-id=\"18d34f0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08629f4 elementor-widget elementor-widget-text-editor\" data-id=\"08629f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft wp-image-1689\" src=\"https:\/\/focs.computer.org\/2024\/wp-content\/uploads\/sites\/3\/2024\/10\/myerson.jpg\" alt=\"\" width=\"133\" height=\"200\" \/><\/p><p><strong>Speaker:<\/strong> Roger Myerson, University of Chicago<\/p><p><strong>Title:<\/strong> <a href=\"https:\/\/youtu.be\/XnAtqxvCq6Q\">Dual Reduction and Elementary Games with Senders and Receivers<\/a><\/p><p><strong>Abstract:<\/strong> Consider the incentive constraints that define the incentive-compatible mechanisms of a senders-receivers game. Duals of these linear constraints form Markov chains on the senders&#8217; type sets and the receivers&#8217; action sets. The minimal nonempty absorbing sets of these Markov chains can be interpreted as the types and actions in a dual-reduced game. Any incentive-compatible mechanism of a dual-reduced game corresponds to an equivalent incentive-compatible mechanism for the original game. We say that a game is elementary if all nontrivial incentive constraints can be satisfied as strict inequalities in incentive-compatible mechanisms. Any senders-receivers game can be reduced to an elementary game by iterative dual reduction. The set of games with transitive dual solutions is dense.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-9897c1a e-grid e-con-boxed e-con e-parent\" data-id=\"9897c1a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-970fc87 elementor-widget elementor-widget-heading\" data-id=\"970fc87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Plenary 2 (Irit Dinur, 2:40pm-3:50pm, Monday, October 28, 2024)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-e735e4a e-grid e-con-boxed e-con e-parent\" data-id=\"e735e4a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a9c844 elementor-widget elementor-widget-text-editor\" data-id=\"8a9c844\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft wp-image-1690\" src=\"https:\/\/focs.computer.org\/2024\/wp-content\/uploads\/sites\/3\/2024\/10\/dinur-261x300.png\" alt=\"\" width=\"174\" height=\"200\" srcset=\"https:\/\/focs.computer.org\/2024\/wp-content\/uploads\/sites\/3\/2024\/10\/dinur-261x300.png 261w, https:\/\/focs.computer.org\/2024\/wp-content\/uploads\/sites\/3\/2024\/10\/dinur.png 370w\" sizes=\"(max-width: 174px) 100vw, 174px\" \/><\/p><p><strong>Speaker:<\/strong> Irit Dinur, Weizmann Institute<\/p><p><strong>Title:<\/strong> Expanders and PCPs: Emergence from Local to Global<\/p><p><strong>Abstract:<\/strong><\/p><p>PCPs offer a way of verifying NP proofs with high confidence using local checks, thereby demonstrating a form of \u2018computational emergence\u2019 in which the global correctness of a PCP proof emerges from small, independent, and local checks. In essence, while each local check only provides information about a tiny piece of the proof, the design of the PCP ensures that these local pieces collectively reflect the correctness of the whole. Thus, PCPs are NP proofs cast into a distributed form, where local checks collectively verify the global correctness.<\/p><p>Expander graphs have been used within PCP constructions, naturally yielding fault-tolerance at a low overhead. However, true local-to-global emergent behavior is exhibited by high-dimensional expanders, much more than classical expanders.<\/p><p>In this talk, we will describe several phenomena of local-to-global emergence in high-dimensional expanders, and highlight their applications to error-correcting codes and PCPs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-71a8e26 e-grid e-con-boxed e-con e-parent\" data-id=\"71a8e26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee81353 elementor-widget elementor-widget-heading\" data-id=\"ee81353\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Plenary 3 (Christos Papadimitriou, 10:50am-12:00pm, Tuesday, October 29, 2024)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-482c0a8 e-grid e-con-boxed e-con e-parent\" data-id=\"482c0a8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-19e3d07 elementor-widget elementor-widget-text-editor\" data-id=\"19e3d07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft wp-image-1691\" src=\"https:\/\/focs.computer.org\/2024\/wp-content\/uploads\/sites\/3\/2024\/10\/papa-300x300.jpg\" alt=\"\" width=\"200\" height=\"200\" srcset=\"https:\/\/focs.computer.org\/2024\/wp-content\/uploads\/sites\/3\/2024\/10\/papa-300x300.jpg 300w, https:\/\/focs.computer.org\/2024\/wp-content\/uploads\/sites\/3\/2024\/10\/papa-150x150.jpg 150w, https:\/\/focs.computer.org\/2024\/wp-content\/uploads\/sites\/3\/2024\/10\/papa.jpg 407w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/p><p><strong>Speaker:<\/strong> Christos Papadimitriou, Columbia University<\/p><p><strong>Title:<\/strong> <a href=\"https:\/\/youtu.be\/Hjrwxz2lcII\">Computing with Dynamical Systems<\/a><\/p><p><strong>Abstract:<\/strong> TBA<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-88b8206 e-grid e-con-boxed e-con e-parent\" data-id=\"88b8206\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ebe470 elementor-widget elementor-widget-heading\" data-id=\"7ebe470\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Knuth Prize Lecture (Rajeev Alur, 2:40pm-3:50pm, Tuesday, October 29, 2024)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-9a5ea88 e-grid e-con-boxed e-con e-parent\" data-id=\"9a5ea88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-97ebe17 elementor-widget elementor-widget-text-editor\" data-id=\"97ebe17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1692\" src=\"https:\/\/focs.computer.org\/2024\/wp-content\/uploads\/sites\/3\/2024\/10\/alur-215x300.jpg\" alt=\"\" width=\"143\" height=\"200\" srcset=\"https:\/\/focs.computer.org\/2024\/wp-content\/uploads\/sites\/3\/2024\/10\/alur-215x300.jpg 215w, https:\/\/focs.computer.org\/2024\/wp-content\/uploads\/sites\/3\/2024\/10\/alur.jpg 591w\" sizes=\"(max-width: 143px) 100vw, 143px\" \/><\/p><p><strong>Speaker:<\/strong> Rajeev Alur, University of Pennsylvania<\/p><p><strong>Title:<\/strong> <a href=\"https:\/\/youtu.be\/kA_fKR05cAQ\">Specification-guided Reinforcement Learning<\/a><\/p><p><strong>Abstract:<\/strong> Reinforcement learning (RL) aims to learn optimal policies for accomplishing tasks in unknown environments, and has been recently successful in applications in robotics. Traditionally, the task is encoded in the form of a local state-based reward function which becomes cumbersome for long-horizon goals. An appealing alternative is to use high-level logical specifications, opening the direction of RL from logical specifications. In this talk, I will review both theoretical results and practical tools in this emerging area.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Plenary Talks Plenary 1 (Roger Myerson, 10:50am-12:00pm, Monday, October 28) Speaker: Roger Myerson, University of Chicago Title: Dual Reduction and Elementary Games with Senders and Receivers Abstract: Consider the incentive constraints that define the incentive-compatible mechanisms of a senders-receivers game. Duals of these linear constraints form Markov chains on the senders&#8217; type sets and the [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1682","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/focs.computer.org\/2024\/wp-json\/wp\/v2\/pages\/1682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/focs.computer.org\/2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/focs.computer.org\/2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/focs.computer.org\/2024\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/focs.computer.org\/2024\/wp-json\/wp\/v2\/comments?post=1682"}],"version-history":[{"count":0,"href":"https:\/\/focs.computer.org\/2024\/wp-json\/wp\/v2\/pages\/1682\/revisions"}],"wp:attachment":[{"href":"https:\/\/focs.computer.org\/2024\/wp-json\/wp\/v2\/media?parent=1682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}