From 6d3b8ed2fb2b45e1ccc339b34375ddb78770f56c Mon Sep 17 00:00:00 2001 From: Edgar Bering Date: Wed, 3 Nov 2010 15:33:37 -0400 Subject: [PATCH] toronto and hackathon --- events.xml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/events.xml b/events.xml index 8e9e0f6..920ed65 100644 --- a/events.xml +++ b/events.xml @@ -4,6 +4,27 @@ + + +

The CSC is going to Toronto to visit UofT's CSSU, see what they do, and have beer with them. + If you would like to come along, please come by the office and sign up. The cost for the trip is $2 per member.

+ +
+ + + +

Come join the CSC for a night of code, music with only 8 bits, and comradarie. We will be in the C&D Lounge from 7pm until 7am working on personal projects, open source projects, and whatever else comes to mind. If you're interested in getting involved in free/open source development, some members will be on hand to guide you through the process. +

+ + +

Come join the CSC for a night of code, music with only 8 bits, and comradarie. We will be +in the C&D Lounge from 7pm until 7am working on personal projects, open source projects, and +whatever else comes to mind. If you're interested in getting involved in free/open source development, +some members will be on hand to guide you through the process. +

+ +
+

In this talk, we will give a few examples that illustrate the basic method and show how it can be used to prove the existence of objects with desirable combinatorial properties as well as produce them in expected polynomial time via randomized algorithms. Our main goal will be to present a very slick proof from 1995 due to Spencer on the performance of a randomized greedy algorithm for a set-packing problem. Spencer, for seemingly no reason, introduces a time variable into his greedy algorithm and treats set-packing as a Poisson process. Then, like magic, he is able to show that his greedy algorithm is very likely to produce a good result using basic properties of expected value.