Todos los cursos serán en inglés – *All courses will be given in English.*

**Graphs with high chromatic number.**

**Marthe Bonamy**

TA: Antonia Labarca

`n`-colouring. However, there is no theoretical guarantee that

^{0.2}`n`is best here — for all we know it could be replaced with log n.

^{0.2}This algorithmic failure reflects the (structural) fact that graphs with high chromatic number can be extremely simple on a small scale — for example, they can “look like a tree” around every vertex. To construct such objects, Erdős developed the so-called probabilistic method, which proved to be useful for a wide range of graph-theoretic problems. However, the difficulty (and beauty) of chromatic number is that constructions of locally simple/globally hard graphs also arise from other areas: for instance the Borsuk-Ulam theorem directly provides graphs with high chromatic number in which all small subgraphs are bipartite (2-colorable).

This question “What makes the chromatic number large?” has several starkly different answers and seems to be very difficult. Ideally, we would like to tie this elusive parameter to other tamer parameters, like the maximum degree, even to some that are still hard to compute but present a local structure, like the maximum size of a clique (clique number). This is impossible in general, but we investigate specific graph classes, such as perfect graphs or minor closed classes (e.g. planar), where it can be tied to a parameter or another.

In this course, we will keep an eye on both structural results and (sometimes!) efficient algorithms.

**Provable Algorithms for Data Mining and Machine Learning.**

**Vincent Cohen-Addad**

TA: Benjamín Jauregui

**Abstract:**

Data mining and machine learning tools are at the heart of large number of computer science applications, in both academic and industrial worlds. Thus, designing efficient and scalable algorithms for problems arising in these contexts is a central research question. In this course, we will present algorithms with provable guarantees for several of these applications (e.g.: clustering), and in several contexts (e.g.: differential-privacy).

**Linear programming: the quest for strongly polynomial algorithms.**

**Laszlo Vegh**

TA: Arturo Merino

**Abstract:**

Breakthrough results in the 1980s led to the first polynomial-time algorithms for linear programming: the ellipsoid and interior point methods. However, the running time of these algorithms depends on the bit-complexity of the input. It remains a major open problem to find a strongly polynomial algorithm, where the running time only depends on the number of variables and constraints.

Such algorithms are known for various network optimization problems. For general linear programs, the best known bounds depend on certain condition numbers of the constraint matrix.

The lectures will give an overview of classical and recent results and techniques for strongly polynomial computability. These include proximity results, as well as a special class of combinatorial interior point methods.