{"id":89,"date":"2025-01-31T19:43:37","date_gmt":"2025-01-31T19:43:37","guid":{"rendered":"https:\/\/focs.computer.org\/2025\/schedule\/"},"modified":"2025-12-18T03:29:15","modified_gmt":"2025-12-18T03:29:15","slug":"schedule","status":"publish","type":"page","link":"https:\/\/focs.computer.org\/2025\/schedule\/","title":{"rendered":"Schedule"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"89\" class=\"elementor elementor-89\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-7e440167 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7e440167\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d2bd754\" data-id=\"7d2bd754\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61341c97 elementor-widget elementor-widget-heading\" data-id=\"61341c97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Program Schedule<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-5588f3de elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5588f3de\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8b9140c\" data-id=\"8b9140c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-48bc1761 elementor-widget elementor-widget-text-editor\" data-id=\"48bc1761\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>All the times are in AEDT (UTC +11). Additional (social) activities are or will be listed <a href=\"https:\/\/focs.computer.org\/2025\/activities\/\">on the corresponding page<\/a>: fun runs, walks, etc. A mobile-friendly schedule site is available \ud83d\udd17 <strong><a href=\"https:\/\/focs2025schedule.ag-pages.workers.dev\/\">at this address<\/a><\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-5fb53509 e-grid e-con-boxed e-con e-parent\" data-id=\"5fb53509\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55254f02 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"55254f02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#Day1\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Day 1<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c815bf8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6c815bf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#Day2\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Day 2<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-817d851 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"817d851\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#Day3\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Day 3<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dfa61a7 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1dfa61a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#Day4\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Day 4<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-d1a332 e-con-full e-flex e-con e-parent\" data-id=\"d1a332\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-791f5a95 elementor-widget elementor-widget-text-editor\" data-id=\"791f5a95\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"Day1\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 style=\"text-align: center\"><span style=\"color: #23a455\">Day 1: Sunday, December 14, 2025<\/span><\/h1><p><span style=\"text-align: var(--text-align)\">The planned events on Day 1 include Workshops and a Welcome Reception.\u00a0<\/span><\/p><table dir=\"ltr\" style=\"width: 988px;margin-left: auto;margin-right: auto\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" data-sheets-root=\"1\" data-sheets-baot=\"1\"><colgroup> <col width=\"100\" \/> <col width=\"325\" \/> <col width=\"325\" \/> <col width=\"325\" \/><\/colgroup><tbody><tr><td>\u00a0<\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Workshop Session A<br \/>(Blackwattle 1)<\/span><\/h3><\/td><td style=\"text-align: center\"><h3><span style=\"color: #23a455\">Workshop Session B<br \/>(Blackwattle 2)<\/span><\/h3><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Workshop Session C<br \/>(Blackwattle 3)<\/span><\/h3><\/td><\/tr><tr><td><span style=\"font-weight: bolder\">8:30\u20139:00<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Welcome tea and registration \u2615<\/span><\/h3><\/th><\/tr><tr><td>\u00a0<b>9:00\u201310:00<\/b><\/td><td><strong><a href=\"https:\/\/sites.google.com\/corp\/view\/quantumfocs2025\/home\">Breaking and Making Quantum Speedups<\/a><br \/><\/strong>(organized by Siddhartha Jain, Seyoon Ragavan, Alexander Schmidhuber, and Noah Shutty)<\/td><td><div data-ogsc=\"\"><a href=\"https:\/\/rajeshjayaram.com\/focs-25-anns-workshop.html\"><b data-ogsc=\"\" data-olk-copy-source=\"MessageBody\">Approximate Nearest Neighbor Search:\u00a0Bridging Theoretical Foundations and Industrial Frontiers<\/b><\/a><\/div><div data-ogsc=\"\">(organized by Piotr Indyk, Rajesh Jayaram, and Ravi Krishnaswamy)<\/div><\/td><td><div data-ogsc=\"\" data-olk-copy-source=\"MessageBody\"><a href=\"https:\/\/sites.google.com\/view\/tedpyne\/focs25-workshop\"><b data-ogsc=\"\">Space: Connecting Classical and Catalytic Approaches<\/b><\/a><\/div><div data-ogsc=\"\">(organized by Ian Mertz and Ted Pyne )<\/div><\/td><\/tr><tr><td><span style=\"font-weight: bolder\">10:00\u201310:30<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break \u2615<\/span><\/h3><\/th><\/tr><tr><td>\u00a0<b>10:30\u201312:00<\/b><\/td><td><strong><a href=\"https:\/\/sites.google.com\/corp\/view\/quantumfocs2025\/home\">Breaking and Making Quantum Speedups<\/a><br \/><\/strong>(organized by Siddhartha Jain, Seyoon Ragavan, Alexander Schmidhuber, and Noah Shutty)<\/td><td><div data-ogsc=\"\"><a href=\"https:\/\/rajeshjayaram.com\/focs-25-anns-workshop.html\"><b data-ogsc=\"\" data-olk-copy-source=\"MessageBody\">Approximate Nearest Neighbor Search:\u00a0Bridging Theoretical Foundations and Industrial Frontiers<\/b><\/a><\/div><div data-ogsc=\"\">(organized by Piotr Indyk, Rajesh Jayaram, and Ravi Krishnaswamy)<\/div><\/td><td><div data-ogsc=\"\" data-olk-copy-source=\"MessageBody\"><a href=\"https:\/\/sites.google.com\/view\/tedpyne\/focs25-workshop\"><b data-ogsc=\"\">Space: Connecting Classical and Catalytic Approaches<\/b><\/a><\/div><div data-ogsc=\"\">(organized by Ian Mertz and Ted Pyne )<\/div><\/td><\/tr><tr><td><span style=\"font-weight: bolder\">12:00<b>\u2013<\/b>1:30<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Lunch (provided) \ud83c\udf7d\ufe0f<\/span><\/h3><\/th><\/tr><tr><td><strong>1:30\u20133:00<\/strong><\/td><td><strong><a href=\"https:\/\/sites.google.com\/corp\/view\/quantumfocs2025\/home\">Breaking and Making Quantum Speedups<\/a><br \/><\/strong>(organized by Siddhartha Jain, Seyoon Ragavan, Alexander Schmidhuber, and Noah Shutty)<\/td><td><div data-ogsc=\"\"><a href=\"https:\/\/rajeshjayaram.com\/focs-25-anns-workshop.html\"><b data-ogsc=\"\" data-olk-copy-source=\"MessageBody\">Approximate Nearest Neighbor Search:\u00a0Bridging Theoretical Foundations and Industrial Frontiers<\/b><\/a><\/div><div data-ogsc=\"\">(organized by Piotr Indyk, Rajesh Jayaram, and Ravi Krishnaswamy)<\/div><\/td><td><div data-ogsc=\"\"><a href=\"https:\/\/santoshv.github.io\/focs2025-tutorial\"><b data-ogsc=\"\"><span data-ogsc=\"rgb(34, 34, 34)\" data-olk-copy-source=\"MessageBody\">The Localization Method for High-dimensional\u00a0<\/span><span data-ogsc=\"rgb(34, 34, 34)\">Inequalities<\/span><\/b><\/a><\/div><div data-ogsc=\"\">(organized by Santosh S. Vempala)<\/div><\/td><\/tr><tr><td><span style=\"font-weight: bolder\">3:00<b>\u20133<\/b>:30<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break <\/span>\u2615<\/h3><\/th><\/tr><tr><td>\u00a0<strong>3<\/strong><b>:30\u20134:30<\/b><\/td><td><strong><a href=\"https:\/\/sites.google.com\/corp\/view\/quantumfocs2025\/home\">Breaking and Making Quantum Speedups<\/a><br \/><\/strong>(organized by Siddhartha Jain, Seyoon Ragavan, Alexander Schmidhuber, and Noah Shutty)<\/td><td><div data-ogsc=\"\"><a href=\"https:\/\/rajeshjayaram.com\/focs-25-anns-workshop.html\"><b data-ogsc=\"\" data-olk-copy-source=\"MessageBody\">Approximate Nearest Neighbor Search:\u00a0Bridging Theoretical Foundations and Industrial Frontiers<\/b><\/a><\/div><div data-ogsc=\"\">(organized by Piotr Indyk, Rajesh Jayaram, and Ravi Krishnaswamy)<\/div><\/td><td><div data-ogsc=\"\"><a href=\"https:\/\/santoshv.github.io\/focs2025-tutorial\"><b data-ogsc=\"\"><span data-ogsc=\"rgb(34, 34, 34)\" data-olk-copy-source=\"MessageBody\">The Localization Method for High-dimensional\u00a0<\/span><span data-ogsc=\"rgb(34, 34, 34)\">Inequalities<\/span><\/b><\/a><\/div><div data-ogsc=\"\">(organized by Santosh S. Vempala)<\/div><\/td><\/tr><tr><td><span style=\"font-weight: bolder\">4:30\u20134:45<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break <\/span><\/h3><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">4:45<b>\u20135:30<\/b><\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Graduating bits<\/span> \ud83c\udf93<\/h3><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">5:30<b>\u20136:00<\/b><\/span><\/td><th colspan=\"3\"><h5><a href=\"https:\/\/www.reconciliation.org.au\/reconciliation\/acknowledgement-of-country-and-welcome-to-country\/#WelcometoCountry\"><span style=\"color: #23a455\">Welcome to Country<\/span><\/a><br \/><em>A Welcome to Country is a cultural practice performed by a Traditional Owner of the local region to welcome visitors to their Traditional Country.<\/em><\/h5><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">6:00<b>\u2013<\/b>8:00<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Welcome Reception \ud83e\udd42<\/span><\/h3><\/th><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<a data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-f644e1d e-con-full e-flex e-con e-child\" data-id=\"f644e1d\" data-element_type=\"container\" data-e-type=\"container\" id=\"Day2\">\n\t\t\t\t<div class=\"elementor-element elementor-element-705266e elementor-widget elementor-widget-text-editor\" data-id=\"705266e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 style=\"text-align: center\"><span style=\"color: #23a455\">Day 2: Monday, December 15, 2025<\/span><\/h1><table dir=\"ltr\" style=\"width: 988px;margin-left: auto;margin-right: auto\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" data-sheets-root=\"1\" data-sheets-baot=\"1\"><colgroup> <col width=\"100\" \/> <col width=\"325\" \/> <col width=\"325\" \/> <col width=\"325\" \/><\/colgroup><tbody><tr><td>\u00a0<b>9:00\u201310:30<\/b><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 1A<br \/>(Blackwattle 1)<\/span><\/h3><p><em>Session chair: Yuval Rabani<\/em><\/p><\/td><td style=\"text-align: center\"><h3><span style=\"color: #23a455\">Session 1B<br \/>(Blackwattle 2)<\/span><\/h3><p><em>Session chair: Josh Alman<\/em><\/p><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 1C<br \/>(Blackwattle 3)<\/span><\/h3><p><em>Session chair: Robin Kothari<\/em><\/p><\/td><\/tr><tr><td>\u00a0<\/td><td>Online Edge Coloring: Sharp Thresholds<br \/><i>Authors:<\/i> J. Blikstad, O. Svensson, R. Vintan, D. Wajc<\/td><td>Integer multiplication is at least as hard as matrix transposition<br \/><i>Authors:<\/i> D. Harvey, J. van der Hoeven<\/td><td>Group Order is in QCMA<br \/><i>Authors:<\/i> F. Le Gall, H. Nishimura, D. Thakkar<\/td><\/tr><tr><td>\u00a0<\/td><td><a href=\"https:\/\/youtu.be\/mAseHou6TGU\">Edge-weighted Matching in the Dark<\/a><br \/><i>Authors:<\/i> Z. Huang, E. Sun, X. Wu, J. Zhao<\/td><td><a href=\"https:\/\/youtu.be\/aOuyUJ-fMbk\">Computing the Polytope Diameter is Even Harder than NP-hard (Already for Perfect Matchings)<\/a><br \/><i>Authors:<\/i> L. Wulf<\/td><td><a href=\"https:\/\/youtu.be\/lTNJTjduo50\">Exponential improvements to the average-case hardness of BosonSampling<\/a><br \/><i>Authors:<\/i> A. Bouland, S. Datta, B. Fefferman, F. Hernandez<\/td><\/tr><tr><td>\u00a0<\/td><td>Integral Online Algorithms for Set Cover and Load Balancing with Convex Objectives<br \/><i>Authors:<\/i> T. Kesselheim, M. Molinaro, K. Patton, S. Singla<\/td><td><a href=\"https:\/\/youtu.be\/mh0VDjmO9js\">Asymptotically Optimal Inapproximability of E$k$-SAT Reconfiguration<\/a><br \/><i>Authors:<\/i> S. Hirahara, N. Ohsaka<\/td><td>RE-completeness of entangled constraint satisfaction problems<br \/><i>Authors:<\/i> E. Culf, K. Mastel<\/td><\/tr><tr><td>\u00a0<\/td><td><a href=\"https:\/\/youtu.be\/1KZWlCdiJ7g\">Optimal 4-Approximation for the Correlated Pandora\u2019s Problem<\/a><br \/><i>Authors:<\/i> N. Bansal, Z. Huang, Z. Zhu<\/td><td>Ineffectiveness for Search and Undecidability of PCSP Meta-Problems<br \/><i>Authors:<\/i> A. Larrauri<\/td><td>Gap-preserving reductions and RE-completeness of Independent Set Games<br \/><i>Authors:<\/i> L. Man\u010dinska, P. Spaas, T. Spirig, M. Vernooij<\/td><\/tr><tr><td>\u00a0<\/td><td><a href=\"https:\/\/youtu.be\/uxG9UItW5Mo\">A Little Clairvoyance Is All You Need<\/a><br \/><i>Authors:<\/i> A. Gupta, H. Kaplan, A. Lindermayr, J. Schl\u00f6ter, S. Yingchareonthawornchai<\/td><td>Inapproximability of Finding Sparse Vectors in Codes, Subspaces, and Lattices<br \/><i>Authors:<\/i> V. Bhattiprolu, V. Guruswami, E. Lee, X. Ren<\/td><td>Incompressibility and spectral gaps of random circuits<br \/><i>Authors:<\/i> C. Chen, J. Haah, J. Haferkamp, Y. Liu, T. Metger, X. Tan<\/td><\/tr><tr><td><span style=\"font-weight: bolder\">10:30\u201310:50<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break \u2615<\/span><\/h3><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">10:50\u201312:02<\/span><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 2A<br \/>(Blackwattle 1)<\/span><\/h3><p><em>Session chair: Yang Liu<\/em><\/p><\/td><td style=\"text-align: center\"><h3><span style=\"color: #23a455\">Session 2B<br \/>(Blackwattle 2)<\/span><\/h3><p><em>Session chair: Sepehr Assadi<\/em><\/p><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 2C<br \/>(Blackwattle 3)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Ran Canetti<\/em><\/p><\/td><\/tr><tr><td>\u00a0<\/td><td><a href=\"https:\/\/youtu.be\/P3ss7Corm_Y\">Weighted k-Path and Other Problems in Almost O*(2^k) Deterministic Time via Dynamic Representative Sets<\/a><br \/><i>Author:<\/i> J. Nederlof<\/td><td>Factorization Norms and an Inverse Theorem for MaxCut<br \/><i>Authors:<\/i> I. Balla, L. Hambardzumyan, I. Tomon<\/td><td>The Sponge is Quantum Indifferentiable<br \/><i>Authors:<\/i> G. Alagic, J. Carolan, C. Majenz, S. Tokat<\/td><\/tr><tr><td>\u00a0<\/td><td>Improved 2-Approximate Shortest Paths for close vertex pairs<br \/><i>Author:<\/i> M. Gupta<\/td><td>More efficient sifting for grid norms, and applications to multiparty communication complexity<br \/><i>Authors:<\/i> Z. Kelley, X. Lyu<\/td><td>Parallel Repetition for Post-Quantum Arguments<br \/><i>Authors:<\/i> A. Huang, Y. Kalai<\/td><\/tr><tr><td>\u00a0<\/td><td>Paths and Intersections: Exact Emulators for Planar Graphs<br \/><i>Authors:<\/i> G. Li, Z. Tan, T. Zhang<\/td><td>Sign-Rank of k-Hamming Distance is Constant<br \/><i>Authors:<\/i> M. G\u00f6\u00f6s, N. Harms, V. Imbach, D. Sokolov<\/td><td><a href=\"https:\/\/youtu.be\/Njb9pVqjbI4\">On the Impossibility of SNARGs with Short CRS (or: Revisiting Gentry-Wichs Barrier in the Non-adaptive Setting)<\/a><br \/><i>Authors:<\/i> L. Chen, Z. Jin<\/td><\/tr><tr><td>\u00a0<\/td><td>Distance Approximating Minors for Planar and Minor-Free Graphs<br \/><i>Authors:<\/i> H. Chang, J. Conroy<\/td><td>Direct Product Theorems for Randomized Query Complexity<br \/><i>Authors:<\/i> S. Ben-David, E. Blais<\/td><td>On Succinct Obfuscation via Propositional Logic (or: How to use pv-IO)<br \/><i>Authors:<\/i> A. Jain, Z. Jin, S. Mathialagan, O. Paneth<\/td><\/tr><tr><td><span style=\"font-weight: bolder\">12:02<b>\u2013<\/b>1:30<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Lunch (provided) \ud83c\udf7d\ufe0f<\/span><\/h3><\/th><\/tr><tr><td><strong>1:30\u20132:30<\/strong><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Plenary 1<\/span><\/h3><h4>Shafi Goldwasser, MIT and Berkeley<br \/><em>&#8220;Recent Results In ML Safety using a Complexity\/Cryptography Perspective&#8221;<\/em><\/h4><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">2:30<b>\u20133<\/b>:00<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break <\/span>\u2615<\/h3><\/th><\/tr><tr><td><strong>3:00\u20134:12<\/strong><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 3A<br \/>(Blackwattle 1)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: <span data-olk-copy-source=\"MessageBody\">Sepehr Assadi<\/span><\/em><\/p><\/td><td style=\"text-align: center\"><h3><span style=\"color: #23a455\">Session 3B<br \/>(Blackwattle 2)<\/span><\/h3><p><em>Session chair: Michael A. Forbes<\/em><\/p><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 3C<br \/>(Blackwattle 3)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: <span data-olk-copy-source=\"MessageBody\">Ronen Shaltiel<\/span><\/em><\/p><\/td><\/tr><tr><td>\u00a0<\/td><td><a href=\"https:\/\/youtu.be\/LNwfcXCuVMU\">An Improved Greedy Approximation for (Metric) $k$-Means<\/a><br \/><i>Authors:<\/i> M. Charikar, V. Cohen-Addad, R. Gao, F. Grandoni, E. Lee, E. van Wijland<\/td><td><a href=\"https:\/\/youtu.be\/ouctstCngmU\">Deterministic factorization of constant-depth algebraic circuits in subexponential time<\/a><br \/><i>Authors:<\/i> S. Bhattacharjee, M. Kumar, V. Ramanathan, R. Saptharishi, S. Saraf<\/td><td>Cryptography meets worst-case complexity: Optimal security and more from iO and worst-case assumptions<br \/><i>Authors:<\/i> R. Ilango, A. Lombardi<\/td><\/tr><tr><td>\u00a0<\/td><td>Stochastic Knapsack without Relaxing the Capacity<br \/><i>Authors:<\/i> A. De, S. Khanna, N. White<\/td><td>Rank Bounds and PIT for $\\Sigma^3 \\Pi \\Sigma \\Pi^d$ circuits via a non-linear Edelstein-Kelly theorem<br \/><i>Authors:<\/i> A. Garg, R. Oliveira, A. Sengupta<\/td><td>Solving Linear Inequalities over Convex Sets &amp; its Applications to Cryptography and Hydrodynamics<br \/><i>Authors:<\/i> S. Basu, H. Khorasgani, H. Maji, H. Nguyen<\/td><\/tr><tr><td>\u00a0<\/td><td><a href=\"https:\/\/youtu.be\/0M3o-TaVdtY\">Adaptivity Gaps for Stochastic Probing with Subadditive Functions<\/a><br \/><i>Authors:<\/i> J. Li, Y. Liu, Y. Zhang<\/td><td>Kronecker Powers, Orthogonal Vectors, and the Asymptotic Spectrum<br \/><i>Authors:<\/i> J. Alman, B. Li<\/td><td>Binary Codes for Computationally Bounded Errors Under Standard Crypto Assumptions<br \/><i>Authors:<\/i> G. Lu, J. Silbak, D. Wichs<\/td><\/tr><tr><td>\u00a0<\/td><td>Stochastic scheduling with Bernoulli-type jobs through policy stratification<br \/><i>Authors:<\/i> A. Antoniadis, R. Hoeksma, K. Schewior, M. Uetz<\/td><td>Complexity theory of orbit closure intersection for tensors: reductions, completeness, and graph isomorphism hardness<br \/><i>Authors:<\/i> V. Lysikov, M. Walter<\/td><td>Succinct Homomorphic MACs from Groups and Applications<br \/><i>Authors:<\/i> Y. Ishai, H. Li, H. Lin<\/td><\/tr><tr><td><span style=\"font-weight: bolder\">4:12\u20134:30<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break <\/span><\/h3><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">4:30<b>\u20135:24<\/b><\/span><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 4A<br \/>(Blackwattle 1)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Yang Liu<\/em><\/p><\/td><td style=\"text-align: center\"><h3><span style=\"color: #23a455\">Session 4B<br \/>(Blackwattle 2)<\/span><\/h3><p><em>Session chair: <span data-olk-copy-source=\"MessageBody\">Sumegha Garg<\/span><\/em><\/p><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 4C<br \/>(Blackwattle 3)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Robin Kothari<\/em><\/p><\/td><\/tr><tr><td>\u00a0<\/td><td>Faster Mixing of the Jerrum-Sinclair Chain<br \/><i>Authors:<\/i> X. Chen, W. Feng, Z. Ju, T. Miao, Y. Yin, X. Zhang<\/td><td>Bipartite Matching is in Catalytic Logspace<br \/><i>Authors:<\/i> A. Agarwala, I. Mertz<\/td><td><a href=\"https:\/\/youtu.be\/kU0zuxNF9uc\">A distillation\u2013teleportation protocol for fault-tolerant QRAM<\/a><br \/><i>Authors:<\/i> A. Dalzell, C. Hann, A. Gily\u00e9n, S. McArdle, G. Salton, Q. Nguyen, A. Kubica, F. Brandao<\/td><\/tr><tr><td>\u00a0<\/td><td>Rapid Mixing on Random Regular Graphs beyond Uniqueness<br \/><i>Authors:<\/i> X. Chen, Z. Chen, Z. Chen, Y. Yin, X. Zhang<\/td><td>Collapsing Catalytic Classes<br \/><i>Authors:<\/i> M. Koucky, I. Mertz, E. Pyne, S. Sami<\/td><td><a href=\"https:\/\/youtu.be\/eOkxsN2CEHM\">Adversarially robust quantum state learning and testing<\/a><br \/><i>Authors:<\/i> M. Aliakbarpour, V. Braverman, N. Chia, Y. Liu<\/td><\/tr><tr><td>\u00a0<\/td><td>Deterministic counting from coupling independence<br \/><i>Authors:<\/i> X. Chen, W. Feng, H. Guo, X. Zhang, Z. Zou<\/td><td><a href=\"https:\/\/youtu.be\/I_5CrWbmopA\">Shuffling Cards When You Are of Very Little Brain: Low Memory Generation of Permutations<\/a><br \/><i>Authors:<\/i> M. Naor, B. Menuhin<\/td><td>Learning quantum Gibbs states locally and efficiently<br \/><i>Authors:<\/i> C. Chen, A. Anshu, Q. Nguyen<\/td><\/tr><tr><td><span style=\"font-weight: bolder\">5:24\u20136:00<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break <\/span><\/h3><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">6:00<b>\u2013<\/b>7:30<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Business meeting \ud83d\udcca<\/span><\/h3><\/th><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-febe8fe e-con-full e-flex e-con e-child\" data-id=\"febe8fe\" data-element_type=\"container\" data-e-type=\"container\" id=\"Day3\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-63c8ccf e-con-full e-flex e-con e-child\" data-id=\"63c8ccf\" data-element_type=\"container\" data-e-type=\"container\" id=\"Day4\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d1e18f3 elementor-widget elementor-widget-text-editor\" data-id=\"d1e18f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 style=\"text-align: center\"><span style=\"color: #23a455\">Day 3: Tuesday, December 16, 2025<\/span><\/h1><table dir=\"ltr\" style=\"width: 988px;margin-left: auto;margin-right: auto\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" data-sheets-root=\"1\" data-sheets-baot=\"1\"><colgroup> <col width=\"100\" \/> <col width=\"325\" \/> <col width=\"325\" \/> <col width=\"325\" \/><\/colgroup><tbody><tr><td>\u00a0<b>9:00\u201310:30<\/b><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 5A<br \/>(Blackwattle 1)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Sanjeev Khanna<\/em><\/p><\/td><td style=\"text-align: center\"><h3><span style=\"color: #23a455\">Session 5B<br \/>(Blackwattle 2)<\/span><\/h3><p><em>Session chair: Madhur Tulsiani<\/em><\/p><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 5C<br \/>(Blackwattle 3)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Xi Chen<\/em><\/p><\/td><\/tr><tr><td>\u00a0<\/td><td><p>Near-Optimal Fault-Tolerant Strong Connectivity Preservers<\/p><p><i>Authors:<\/i> G. Hoppenworth, T. Saranurak, B. Wang<\/p><\/td><td><p>Random Reed-Solomon Codes and Random Linear Codes are Locally Equivalent<\/p><p><i>Authors:<\/i> M. Levi, J. Mosheiff, N. Shagrithaya<\/p><\/td><td>An Improved Bound for the Beck-Fiala Conjecture<br \/><i>Authors:<\/i> N. Bansal, H. Jiang<\/td><\/tr><tr><td>\u00a0<\/td><td><p>Deterministic Almost-Linear-Time Gomory-Hu Trees<\/p><p><i>Authors:<\/i> A. Abboud, R. Kyng, J. Li, D. Panigrahi, M. Probst, T. Saranurak, W. Yuan, W. Yuan<\/p><\/td><td><p>Maximally Extendable Product Codes are Good Coboundary Expanders<\/p><p><i>Authors:<\/i> G. Kalachev, P. Panteleev<\/p><\/td><td>A Dense Neighborhood Lemma: Applications of Partial Concept Classes to Domination and Chromatic Number<br \/><i>Authors:<\/i> R. Bourneuf, P. Charbit, S. Thomasse<\/td><\/tr><tr><td>\u00a0<\/td><td><p>Combinatorial Maximum Flow via Weighted Push-Relabel on Shortcut Graphs<\/p><p><i>Authors:<\/i> A. Bernstein, J. Blikstad, J. Li, T. Saranurak, T. Tu<\/p><\/td><td><p>Near-Asymptotically-Good Quantum Codes with Transversal CCZ Gates and Sublinear-Weight Parity-Checks<\/p><p><i>Authors:<\/i> L. Golowich, V. Guruswami<\/p><\/td><td>Strong Sparsification for 1-in-3-SAT via Polynomial Freiman-Ruzsa<br \/><i>Authors:<\/i> B. Bedert, T. Nakajima, K. Okrasa, S. Zivny<\/td><\/tr><tr><td>\u00a0<\/td><td><p>Generalized Flow in Nearly-linear Time on Moderately Dense Graphs<\/p><p><i>Authors:<\/i> S. Jiang, M. Kapralov, L. Er Lu, A. Sidford<\/p><\/td><td><p>A k^{q\/q-2} Lower Bound for Odd Query Locally Decodable Codes from Bipartite Kikuchi Graphs<\/p><p><i>Authors:<\/i> O. Janzer, P. Manohar<\/p><\/td><td>Cycle-factors of regular graphs via entropy<br \/><i>Authors:<\/i> E. Hurley, A. Girao, L. Michel, N. Draganic, A. M\u00fcyesser, M. Christoph<\/td><\/tr><tr><td>\u00a0<\/td><td><p>Almost Tight Additive Guarantees for $k$-Edge-Connectivity<\/p><p><i>Authors:<\/i> N. Kumar, C. Swamy<\/p><\/td><td><p>Improved Lower Bounds for all Odd-Query Locally Decodable Codes<\/p><p><i>Authors:<\/i> A. Basu, J. Hsieh, P. Kothari, A. Lin<\/p><\/td><td>Polynomial Bounds for the Graph Minor Structure Theorem<br \/><i>Authors:<\/i> M. Gorsky, M. Seweryn, S. Wiederrecht<\/td><\/tr><tr><td><span style=\"font-weight: bolder\">10:30\u201310:50<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break \u2615<\/span><\/h3><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">10:50\u201312:02<\/span><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 6A<br \/>(Blackwattle 1)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Michael Kapralov<\/em><\/p><\/td><td style=\"text-align: center\"><h3><span style=\"color: #23a455\">Session 6B<br \/>(Blackwattle 2)<\/span><\/h3><p><em>Session chair: Pravesh Kothari<\/em><\/p><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 6C<br \/>(Blackwattle 3)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: <span data-olk-copy-source=\"MessageBody\">Kevin Tian<\/span><\/em><\/p><\/td><\/tr><tr><td>\u00a0<\/td><td><p><a href=\"https:\/\/youtu.be\/U24Bd-LsWZo\">The Power of Recursive Embeddings for $\\ell_p$ Metrics<\/a><\/p><p><i>Authors:<\/i> R. Krauthgamer, N. Petruschka, S. Sapir<\/p><\/td><td><p>Undirected Multicast Network Coding Gaps via Locally Decodable Codes<\/p><p><i>Authors:<\/i> Z. He, M. Braverman<\/p><\/td><td><a href=\"https:\/\/youtu.be\/qm3RGR07xxg\">How Global Calibration Strengthens Multiaccuracy<\/a><br \/><i>Authors:<\/i> S. Casacuberta, P. Gopalan, V. Kanade, O. Reingold<\/td><\/tr><tr><td>\u00a0<\/td><td><p>Embeddings into Similarity Measures for Nearest Neighbor Search<\/p><p><i>Authors:<\/i> A. Andoni, N. Nosatzki<\/p><\/td><td><p>Constant Rate Codes for Adaptive Broadcasts Do Not Exist<\/p><p><i>Authors:<\/i> K. Efremenko, G. Kol, D. Paramonov, R. Saxena<\/p><\/td><td>High dimensional online calibration in polynomial time<br \/><i>Authors:<\/i> B. Peng<\/td><\/tr><tr><td>\u00a0<\/td><td><p>Average-Distortion Sketching<\/p><p><i>Authors:<\/i> Y. Bao, A. Baweja, N. Menand, E. Waingarten, N. White, T. Zhang<\/p><\/td><td><p>List Decoding Expander-Based Codes up to Capacity in Near-Linear Time<\/p><p><i>Authors:<\/i> S. Srivastava, M. Tulsiani<\/p><\/td><td>Near-Optimal Algorithms for Omniprediction<br \/><i>Authors:<\/i> P. Okoroafor, B. Kleinberg, M. Kim<\/td><\/tr><tr><td>\u00a0<\/td><td><p>Query-Efficient Fixpoints of $\\ell_p$-Contractions<\/p><p><i>Authors:<\/i> S. Haslebacher, J. Lill, P. Schnider, S. Weber<\/p><\/td><td><p>Robust Local Testability of Tensor Products of Constant-Rate Algebraic Geometry Codes<\/p><p><i>Authors:<\/i> S. Garg, A. Sengupta<\/p><\/td><td>Density Measures for Language Generation<br \/><i>Authors:<\/i> J. Kleinberg, F. Wei<\/td><\/tr><tr><td><span style=\"font-weight: bolder\">12:02<b>\u2013<\/b>1:30<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Lunch (provided) \ud83c\udf7d\ufe0f<\/span><\/h3><\/th><\/tr><tr><td><strong>1:30\u20132:30<\/strong><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Plenary 2<\/span><\/h3><h4>Sebastien Bubeck, OpenAI (remote)<br \/><em>&#8220;Recent advances in LLMs for Mathematics&#8221;<\/em><\/h4><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">2:30<b>\u20133<\/b>:10<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break <\/span>\u2615<\/h3><\/th><\/tr><tr><td><strong>3:10\u20134:22<\/strong><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 7A<br \/>(Blackwattle 1)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: <span data-olk-copy-source=\"MessageBody\">Robert Krauthgamer<\/span><\/em><\/p><\/td><td style=\"text-align: center\"><h3><span style=\"color: #23a455\">Session 7B<br \/>(Blackwattle 2)<\/span><\/h3><p><em>Session chair: Sumegha Garg<\/em><\/p><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 7C<br \/>(Blackwattle 3)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Rocco Servedio<\/em><\/p><\/td><\/tr><tr><td>\u00a0<\/td><td><p>Approximating High-Dimensional Earth Mover&#8217;s Distance as Fast as Closest Pair<\/p><p><i>Authors:<\/i> L. Beretta, V. Cohen-Addad, R. Jayaram, E. Waingarten<\/p><\/td><td><p>Fingerprint Filters are Optimal<\/p><p><i>Authors:<\/i> W. Kuszmaul, J. Liang, R. Zhou<\/p><\/td><td><a href=\"https:\/\/youtu.be\/G2C6iQgXmpg\">Overcomplete Tensor Decomposition via Koszul-Young Flattenings<\/a><br \/><i>Authors:<\/i> P. Kothari, A. Moitra, A. Wein<\/td><\/tr><tr><td>\u00a0<\/td><td><p>Root Ridge Leverage Score Sampling for $\\ell_p$ Subspace Approximation<\/p><p><i>Authors:<\/i> D. Woodruff, T. Yasuda<\/p><\/td><td><p>Static Retrieval Revisited: To Optimality and Beyond<\/p><p><i>Authors:<\/i> Y. Hu, W. Kuszmaul, J. Liang, H. Yu, J. Zhang, R. Zhou<\/p><\/td><td>Implicit High-Order Moment Tensor Estimation and Learning Latent Variable Models<br \/><i>Authors:<\/i> I. Diakonikolas, D. Kane<\/td><\/tr><tr><td>\u00a0<\/td><td><p>Perfect L_p Sampling with Polylogarithmic Update Time<\/p><p><i>Authors:<\/i> W. Swartworth, D. Woodruff, S. Zhou<\/p><\/td><td><p>Stronger Cell Probe Lower Bounds via Local PRGs<\/p><p><i>Authors:<\/i> O. Korten, T. Pitassi, R. Impagliazzo<\/p><\/td><td><a href=\"https:\/\/youtu.be\/s4fyYtKnQKw\">Robust Learning of Multi-index Models via Iterative Subspace Approximation<\/a><br \/><i>Authors:<\/i> I. Diakonikolas, G. Iakovidis, D. Kane, N. Zarifis<\/td><\/tr><tr><td>\u00a0<\/td><td><p>\u21132\/\u21132 Sparse Recovery via Weighted Hypergraph Peeling<\/p><p><i>Authors:<\/i> N. Fischer, V. Nakos<\/p><\/td><td><p>Dynamic Dyck and Tree Edit Distance: Decompositions and Reductions to String Edit Distance<br \/><i>Authors:<\/i> D. Das, J. Gilbert, T. Kociumaka, M. Hajiaghayi, B. Saha<\/p><\/td><td>Solving Zero-Sum Games with Fewer Matrix-Vector Products<br \/><i>Authors:<\/i> I. Karmarkar, L. O&#8217;Carroll, A. Sidford<\/td><\/tr><tr><td><span style=\"font-weight: bolder\">4:22\u20134:40<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break <\/span><\/h3><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">4:40<b>\u20135:34<\/b><\/span><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 8A<br \/>(Blackwattle 1)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Thatchaphol Saranurak<\/em><\/p><\/td><td style=\"text-align: center\"><h3><span style=\"color: #23a455\">Session 8B<br \/>(Blackwattle 2)<\/span><\/h3><p><em>Session chair: Salil Vadhan<\/em><\/p><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 8C<br \/>(Blackwattle 3)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: David Woodruff<\/em><\/p><\/td><\/tr><tr><td>\u00a0<\/td><td><p>Fast Algorithms for Graph Arboricity and Related Problems<\/p><p><i>Authors:<\/i> R. Cen, H. Fleischmann, G. Li, J. Li, D. Panigrahi<\/p><\/td><td><p>Ramanujan bigraphs and applications<\/p><p><i>Authors:<\/i> S. Evra, B. Feigon, O. Parzanchevski, K. Maurischat<\/p><\/td><td>Faster exact learning of k-term DNFs with membership and equivalence queries<br \/><i>Authors:<\/i> J. Alman, S. Nadimpalli, S. Patel, R. Servedio<\/td><\/tr><tr><td>\u00a0<\/td><td><p><a href=\"https:\/\/youtu.be\/fCZAX-cZ5xM\">Dynamic Treewidth in Logarithmic Time<\/a><\/p><p><i>Author:<\/i> T. Korhonen<\/p><\/td><td><p>Extractors for Samplable Distributions with Polynomially Small Min-Entropy<\/p><p><i>Authors:<\/i> R. Shaltiel<\/p><\/td><td><a href=\"https:\/\/youtu.be\/7zJVBzojFGU\">Computational-Statistical Tradeoffs from NP-hardness<\/a><br \/><i>Authors:<\/i> G. Blanc, C. Koch, C. Strassle, L. Tan<\/td><\/tr><tr><td>\u00a0<\/td><td><p>Random-Shift Revisited: Tight Approximations for Tree Embeddings and \u21131-Oblivious Routings<\/p><p><i>Authors:<\/i> M. Probst, R. Kyng, T. Rieder<\/p><\/td><td><p>Finding Colorings in One-Sided Expanders<\/p><p><i>Authors:<\/i> R. Buhai, Y. Hua, D. Steurer, A. V\u00e1ri-Kakas<\/p><\/td><td>Theoretical limitations of multi-layer Transformer<br \/><i>Authors:<\/i> L. Chen, B. Peng, H. Wu<\/td><\/tr><tr><td><span style=\"font-weight: bolder\">5:24\u20136:00<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break <\/span><\/h3><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">6:00<b>\u2013<\/b>9:00<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Banquet @ <a href=\"https:\/\/maps.app.goo.gl\/ZdUL6Pj6GupxswZe6\">Squire Landing<\/a> \ud83c\udf74\ud83c\udf77<\/span><\/h3><\/th><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28d5925 elementor-widget elementor-widget-text-editor\" data-id=\"28d5925\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 style=\"text-align: center\"><span style=\"color: #23a455\">Day 4: Wednesday, December 17, 2025<\/span><\/h1><table dir=\"ltr\" style=\"width: 988px;margin-left: auto;margin-right: auto\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" data-sheets-root=\"1\" data-sheets-baot=\"1\"><colgroup> <col width=\"100\" \/> <col width=\"325\" \/> <col width=\"325\" \/> <col width=\"325\" \/><\/colgroup><tbody><tr><td>\u00a0<b>9:00\u201310:30<\/b><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 9A<br \/>(Blackwattle 1)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Artur Czumaj<\/em><\/p><\/td><td style=\"text-align: center\"><h3><span style=\"color: #23a455\">Session 9B<br \/>(Blackwattle 2)<\/span><\/h3><p><em>Session chair:\u00a0Michal Kouck\u00fd<\/em><\/p><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 9C<br \/>(Blackwattle 3)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Santosh Vempala<\/em><\/p><\/td><\/tr><tr><td>\u00a0<\/td><td>Towards True Work-Efficiency in Parallel Derandomization: MIS, Maximal Matching, and Hitting Set<br \/><i>Authors:<\/i> M. Ghaffari, C. Grunau<\/td><td>On Inverse Theorems and Combinatorial Lines<br \/><i>Authors:<\/i> A. Bhangale, S. Khot, Y. Liu, D. Minzer<\/td><td>Characterization of Priority-Neutral Matching Lattices<br \/><i>Authors:<\/i> C. Thomas<\/td><\/tr><tr><td>\u00a0<\/td><td>Parallel $(1+\\epsilon)$-Approximate Multi-Commodity Mincost Flow in Almost Optimal Depth and Work<br \/><i>Authors:<\/i> B. Haeupler, Y. Jiang, Y. Long, T. Saranurak, S. Wang<\/td><td>NP-hardness of the Minimum Circuit Size Problem from Well-Studied Assumptions<br \/><i>Authors:<\/i> S. Hirahara, R. Ilango<\/td><td>Truthful and Almost Envy-Free Mechanism of Allocating Indivisible Goods: the Power of Randomness<br \/><i>Authors:<\/i> X. Bu, B. Tao<\/td><\/tr><tr><td>\u00a0<\/td><td>On the Parallel Complexity of Finding a Matroid Basis<br \/><i>Authors:<\/i> S. Khanna, A. Putterman, J. Song<\/td><td><a href=\"https:\/\/youtu.be\/F2AkjUPW8Dc\">The Proof Analysis Problem<\/a><br \/><i>Authors:<\/i> N. Arteche, A. Atserias, S. de Rezende, E. Khaniki<\/td><td>Beyond Regularity: Simple versus Optimal Mechanisms, Revisited<br \/><i>Authors:<\/i> Y. Feng, Y. Jin<\/td><\/tr><tr><td>\u00a0<\/td><td>Constant Approximation of Arboricity in Near-Optimal Sublinear Time<br \/><i>Authors:<\/i> J. Dai, M. Ghaffari, J. Portmann<\/td><td><a href=\"https:\/\/youtu.be\/9H589I7A4p0\">High-to-Low Dimensional PPA-completeness: Borsuk-Ulam, Tucker, Consensus Halving, and Ham Sandwich<\/a><br \/><i>Authors:<\/i> R. Gao, A. Hollender, A. Rubinstein<\/td><td>Polynomial-Time Approximation Schemes via Utility Alignment: Unit-Demand Pricing and More<br \/><i>Authors:<\/i> R. Bowers, M. Garbea, E. Pountourakis, S. Taggart<\/td><\/tr><tr><td>\u00a0<\/td><td><a href=\"https:\/\/youtu.be\/Ce6EOPSrUbs\">Lower Bounds for Non-adaptive Local Computation Algorithms<\/a><br \/><i>Authors:<\/i> A. Azarmehr, S. Behnezhad, A. Ghafari, M. Sudan<\/td><td>Optimal Trickle-Down Theorems for Path Complexes via C-Lorentzian Polynomials with Applications to Sampling and Log-Concave Sequences<br \/><i>Authors:<\/i> J. Leake, K. Lindberg, S. Gharan<\/td><td><a href=\"https:\/\/youtu.be\/ghpmOlNu3vM\">Nearly Tight Regret Bounds for Profit Maximization in Bilateral Trade<\/a><br \/><i>Authors:<\/i> S. Di Gregorio, P. Duetting, F. Fusco, C. Schwiegelshohn<\/td><\/tr><tr><td><span style=\"font-weight: bolder\">10:30\u201310:50<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break \u2615<\/span><\/h3><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">10:50\u201312:02<\/span><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 10A<br \/>(Blackwattle 1)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Aaron Sidford <\/em><\/p><\/td><td style=\"text-align: center\"><h3><span style=\"color: #23a455\">Session 10B<br \/>(Blackwattle 2)<\/span><\/h3><p><em>Session chair: Cl\u00e9ment Canonne<\/em><\/p><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 10C<br \/>(Blackwattle 3)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Michael A. Forbes<\/em><\/p><\/td><\/tr><tr><td>\u00a0<\/td><td>Radial Isotropic Position via an Implicit Newton&#8217;s Method<br \/><i>Authors:<\/i> A. Jambulapati, J. Li, K. Tian<\/td><td><a href=\"https:\/\/youtu.be\/DXngFx07McM\">Distributed Triangle Detection is Hard in Few Rounds<\/a><br \/><i>Authors:<\/i> S. Assadi, J. Sundaresan<\/td><td>On optimal distinguishers for Planted Clique<br \/><i>Authors:<\/i> A. Nagda, P. Raghavendra<\/td><\/tr><tr><td>\u00a0<\/td><td><a href=\"https:\/\/youtu.be\/bIFmxlU9HOI\">Faster logconcave sampling from a cold start in high dimension<\/a><br \/><i>Authors:<\/i> Y. Kook, S. Vempala<\/td><td><a href=\"https:\/\/youtu.be\/UJCJ-gId1no\">Round Elimination via Self-Reduction: Closing Gaps for Distributed Maximal Matching<\/a><br \/><i>Authors:<\/i> S. Khoury, A. Schild<\/td><td>Tight Low Degree Hardness for Optimizing Pure Spherical Spin Glasses<br \/><i>Authors:<\/i> M. Sellke<\/td><\/tr><tr><td>\u00a0<\/td><td><a href=\"https:\/\/youtu.be\/GmTl74PUixQ\">Optimal Smoothed Analysis of the Simplex Method<\/a><br \/><i>Authors:<\/i> E. Bach, S. Huiberts<\/td><td>Multi-Pass Streaming Lower Bounds for Approximating Max-Cut<br \/><i>Authors:<\/i> Y. Fei, D. Minzer, S. Wang<\/td><td>The Quasi-Polynomial Low-Degree Conjecture is False<br \/><i>Authors:<\/i> R. Buhai, J. Hsieh, A. Jain, P. Kothari<\/td><\/tr><tr><td>\u00a0<\/td><td><a href=\"https:\/\/youtu.be\/Iy1FQARjw0Y\">Handling LP-Rounding for Hierarchical Clustering and Fitting Distances by Ultrametrics<\/a><br \/><i>Authors:<\/i> H. An, M. Kao, C. Lee, M. Lee<\/td><td><a href=\"https:\/\/youtu.be\/WkYa-_ALHDk\">A Polynomial Space Lower Bound for Diameter Estimation in Dynamic Streams<\/a><br \/><i>Authors:<\/i> S. Khanna, A. Padaki, K. Singal, E. Waingarten<\/td><td>PTF Testing Lower Bounds for Non-Gaussian Component Analysis<br \/><i>Authors:<\/i> I. Diakonikolas, D. Kane, S. Liu, T. Pittas<\/td><\/tr><tr><td><span style=\"font-weight: bolder\">12:02<b>\u2013<\/b>1:30<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Lunch (provided) \ud83c\udf7d\ufe0f<\/span><\/h3><\/th><\/tr><tr><td><strong>1:30\u20132:24<\/strong><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 11A<br \/>(Blackwattle 1)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: Eric Blais<\/em><\/p><\/td><td style=\"text-align: center\"><h3><span style=\"color: #23a455\">Session 11B<br \/>(Blackwattle 2)<\/span><\/h3><p><em>Session chair: Troy Lee<\/em><\/p><\/td><td><h3 style=\"text-align: center\"><span style=\"color: #23a455\">Session 11C<br \/>(Blackwattle 3)<\/span><\/h3><p style=\"text-align: center\"><em>Session chair: <span data-olk-copy-source=\"MessageBody\">Bernhard Haeupler<\/span><\/em><\/p><\/td><\/tr><tr><td>\u00a0<\/td><td>Near-Optimal Property Testers for Pattern Matching<br \/><i>Authors:<\/i> C. Jin, T. Kociumaka<\/td><td><a href=\"https:\/\/youtu.be\/cN4whoNd-kM\">Efficiently Batching Unambiguous Interactive Proofs<\/a><br \/><i>Authors:<\/i> B. Berger, R. Goyal, M. Hong, Y. Kalai<\/td><td>Truly Subquadratic Time Algorithms for Diameter and Related Problems in Graphs of Bounded VC-dimension<br \/><i>Authors:<\/i> T. Chan, H. Chang, J. Gao, S. Kisfaludi-Bak, H. Le, D. Zheng<\/td><\/tr><tr><td>\u00a0<\/td><td>Tight Pair Query Lower Bounds for Matching and Earth Mover&#8217;s Distance<br \/><i>Authors:<\/i> A. Azarmehr, S. Behnezhad, M. Roghani, A. Rubinstein<\/td><td>Improved Round-by-round Soundness IOPs via Reed-Muller Codes<br \/><i>Authors:<\/i> D. Minzer, K. Zheng<\/td><td><a href=\"https:\/\/youtu.be\/5XDIIZzdZUM\">Shortest Paths on Convex Polyhedral Surfaces<\/a><br \/><i>Authors:<\/i> H. Wang<\/td><\/tr><tr><td>\u00a0<\/td><td><a href=\"https:\/\/youtu.be\/qxLNQMN4epo\">Instance-Optimal Uniformity Testing and Tracking<\/a><br \/><i>Authors:<\/i> G. Blanc, C. Canonne, E. Waingarten<\/td><td>Proving Natural Distribution Properties is Harder than Testing Them<br \/><i>Authors:<\/i> T. Herman, G. Rothblum<\/td><td><p>Pattern Matching under Weighted Edit Distance<\/p><p><i>Authors:<\/i> P. Charalampopoulos, T. Kociumaka, P. Wellnitz<\/p><\/td><\/tr><tr><td><span style=\"font-weight: bolder\">2:24\u20132:55<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break \u2615<\/span><\/h3><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">2:55\u20134:25<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">\ud83c\udfc6 Session 12<\/span><\/h3><p><em><span style=\"font-weight: normal\">Session chair: Rotem Oshman<\/span><\/em><\/p><\/th><\/tr><tr><td>\u00a0<\/td><td colspan=\"3\" align=\"center\">Godel in Cryptography: Effectively Zero Knowledge Proofs for NP with No Interaction, No Setup, and Perfect Soundness<br \/><i>Author:<\/i> R. Ilango<\/td><\/tr><tr><td>\u00a0<\/td><td colspan=\"3\" align=\"center\">Obfuscation of Unitary Quantum Programs<br \/><i>Authors:<\/i> M-Y. Huang, E-C. Tang<\/td><\/tr><tr><td>\u00a0<\/td><td colspan=\"3\" align=\"center\">Explicit Lossless Vertex Expanders<br \/><i>Authors:<\/i> J-T. Hsieh, A. Lubotzky, S. Mohanty, A. Reiner, R. Y. Zhang<\/td><\/tr><tr><td><span style=\"font-weight: bolder\">4:25\u20134:50<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">Break <\/span><\/h3><\/th><\/tr><tr><td><span style=\"font-weight: bolder\">4:50\u20135:50<\/span><\/td><th colspan=\"3\"><h3><span style=\"color: #23a455\">\ud83c\udfc6 Session 13<\/span><\/h3><p><em><span style=\"font-weight: normal\">Session chair: Ran Raz<\/span><\/em><\/p><\/th><\/tr><tr><td>\u00a0<\/td><td colspan=\"3\" align=\"center\"><a href=\"https:\/\/youtu.be\/Zto00coO9A0\">Quasipolynomial bounds for the corners theorem<\/a><br \/><i>Authors:<\/i> M. Jaber, Y. P. Liu, S. Lovett, A. Ostuni, M. Sawhney<\/td><\/tr><tr><td>\u00a0<\/td><td colspan=\"3\" align=\"center\"><a href=\"https:\/\/youtu.be\/078keY-6Fjw\">Breaking a Long-Standing Barrier: 2-\u03b5 Approximation for Steiner Forest<\/a><br \/><i>Authors:<\/i> A. Ahmadi, I. Gholami, M. Hajiaghayi, P. Jabbarzade, M. Mahdavi<\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Program Schedule All the times are in AEDT (UTC +11). Additional (social) activities are or will be listed on the corresponding page: fun runs, walks, etc. A mobile-friendly schedule site is available \ud83d\udd17 at this address. Day 1 Day 2 Day 3 Day 4 Day 1: Sunday, December 14, 2025 The planned events on Day [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-89","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/focs.computer.org\/2025\/wp-json\/wp\/v2\/pages\/89","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/focs.computer.org\/2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/focs.computer.org\/2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/focs.computer.org\/2025\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/focs.computer.org\/2025\/wp-json\/wp\/v2\/comments?post=89"}],"version-history":[{"count":0,"href":"https:\/\/focs.computer.org\/2025\/wp-json\/wp\/v2\/pages\/89\/revisions"}],"wp:attachment":[{"href":"https:\/\/focs.computer.org\/2025\/wp-json\/wp\/v2\/media?parent=89"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}