On Adaptive Distance Estimation
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
2020 SIGACT REPORT SIGACT EC – Eric Allender, Shuchi Chawla, Nicole Immorlica, Samir Khuller (Chair), Bobby Kleinberg September 14Th, 2020
2020 SIGACT REPORT SIGACT EC – Eric Allender, Shuchi Chawla, Nicole Immorlica, Samir Khuller (chair), Bobby Kleinberg September 14th, 2020 SIGACT Mission Statement: The primary mission of ACM SIGACT (Association for Computing Machinery Special Interest Group on Algorithms and Computation Theory) is to foster and promote the discovery and dissemination of high quality research in the domain of theoretical computer science. The field of theoretical computer science is the rigorous study of all computational phenomena - natural, artificial or man-made. This includes the diverse areas of algorithms, data structures, complexity theory, distributed computation, parallel computation, VLSI, machine learning, computational biology, computational geometry, information theory, cryptography, quantum computation, computational number theory and algebra, program semantics and verification, automata theory, and the study of randomness. Work in this field is often distinguished by its emphasis on mathematical technique and rigor. 1. Awards ▪ 2020 Gödel Prize: This was awarded to Robin A. Moser and Gábor Tardos for their paper “A constructive proof of the general Lovász Local Lemma”, Journal of the ACM, Vol 57 (2), 2010. The Lovász Local Lemma (LLL) is a fundamental tool of the probabilistic method. It enables one to show the existence of certain objects even though they occur with exponentially small probability. The original proof was not algorithmic, and subsequent algorithmic versions had significant losses in parameters. This paper provides a simple, powerful algorithmic paradigm that converts almost all known applications of the LLL into randomized algorithms matching the bounds of the existence proof. The paper further gives a derandomized algorithm, a parallel algorithm, and an extension to the “lopsided” LLL. -
Program Sunday Evening: Welcome Recep- Tion from 7Pm to 9Pm at the Staff Lounge of the Department of Computer Science, Ny Munkegade, Building 540, 2Nd floor
Computational ELECTRONIC REGISTRATION Complexity The registration for CCC’03 is web based. Please register at http://www.brics.dk/Complexity2003/. Registration Fees (In Danish Kroner) Eighteenth Annual IEEE Conference Advance† Late Members‡∗ 1800 DKK 2200 DKK ∗ Sponsored by Nonmembers 2200 DKK 2800 DKK Students+ 500 DKK 600 DKK The IEEE Computer Society ∗The registration fee includes a copy of the proceedings, Technical Committee on receptions Sunday and Monday, the banquet Wednesday, and lunches Monday, Tuesday and Wednesday. Mathematical Foundations +The registration fee includes a copy of the proceedings, of Computing receptions Sunday and Monday, and lunches Monday, Tuesday and Wednesday. The banquet Wednesday is not included. †The advance registration deadline is June 15. ‡ACM, EATCS, IEEE, or SIGACT members. Extra proceedings/banquet tickets Extra proceedings are 350 DKK. Extra banquet tick- ets are 300 DKK. Both can be purchased when reg- istering and will also be available for sale on site. Alternative registration If electronic registration is not possible, please con- tact the organizers at one of the following: E-mail: [email protected] Mail: Complexity 2003 c/o Peter Bro Miltersen In cooperation with Department of Computer Science University of Aarhus ACM-SIGACT and EATCS Ny Munkegade, Building 540 DK 8000 Aarhus C, Denmark Fax: (+45) 8942 3255 July 7–10, 2003 Arhus,˚ Denmark Conference homepage Conference Information Information about this year’s conference is available Location All sessions of the conference and the on the Web at Kolmogorov workshop will be held in Auditorium http://www.brics.dk/Complexity2003/ F of the Department of Mathematical Sciences at Information about the Computational Complexity Aarhus University, Ny Munkegade, building 530, 1st conference is available at floor. -
SIGACT News Complexity Theory Column 93
SIGACT News Complexity Theory Column 93 Lane A. Hemaspaandra Dept. of Computer Science University of Rochester Rochester, NY 14627, USA Introduction to Complexity Theory Column 93 This issue This issue features Swastik Kopparty and Shubhangi Saraf's column, \Local Testing and Decoding of High-Rate Error-Correcting Codes." Warmest thanks to the authors for their fascinating, exciting column! Future issues And please stay tuned to future issues' Complexity Theory Columns, for articles by Neeraj Kayal and Chandan Saha (tentative topic: arithmetic circuit lower bounds); Stephen Fenner and Thomas Thierauf (tentative topic: related to the STOC 2016 quasi-NC bipartite perfect matching algorithm of Fenner, Gurjar, and Thierauf); Srinivasan Arunachalam and Ronald de Wolf (tentative topic: quantum machine learning); and Ryan O'Donnell and John Wright (tentative topic: learning and testing quantum states). 2016{2017 As this issue reaches you, the 2016{2017 academic year will be starting. For those of you who are faculty members, I wish you a theorem-filled year, including the treat of working on research with bright graduate and undergraduate students. For those you who are students (bright ones, of course|you're reading this column!), if you are not already working with a faculty member on research and would like to, don't be shy! Even if you're a young undergraduate, it makes a lot of sense to pop by your favorite theory professor's office, and let him or her know what has most interested you so far within theory, if something has (perhaps a nifty article you read by Kopparty and Saraf?), and that you find theory thrilling, if you do (admit it, you do!), and that you'd love to be doing theory research as soon as possible and would deeply appreciate any advice as to what you can do to best make that happen. -
Are All Distributions Easy?
Are all distributions easy? Emanuele Viola∗ November 5, 2009 Abstract Complexity theory typically studies the complexity of computing a function h(x): f0; 1gn ! f0; 1gm of a given input x. We advocate the study of the complexity of generating the distribution h(x) for uniform x, given random bits. Our main results are: • There are explicit AC0 circuits of size poly(n) and depth O(1) whose output n P distribution has statistical distance 1=2 from the distribution (X; i Xi) 2 f0; 1gn × f0; 1; : : : ; ng for uniform X 2 f0; 1gn, despite the inability of these P circuits to compute i xi given x. Previous examples of this phenomenon apply to different distributions such as P n+1 (X; i Xi mod 2) 2 f0; 1g . We also prove a lower bound independent from n on the statistical distance be- tween the output distribution of NC0 circuits and the distribution (X; majority(X)). We show that 1 − o(1) lower bounds for related distributions yield lower bounds for succinct data structures. • Uniform randomized AC0 circuits of poly(n) size and depth d = O(1) with error can be simulated by uniform randomized circuits of poly(n) size and depth d + 1 with error + o(1) using ≤ (log n)O(log log n) random bits. Previous derandomizations [Ajtai and Wigderson '85; Nisan '91] increase the depth by a constant factor, or else have poor seed length. Given the right tools, the above results have technically simple proofs. ∗Supported by NSF grant CCF-0845003. Email: [email protected] 1 Introduction Complexity theory, with some notable exceptions, typically studies the complexity of com- puting a function h(x): f0; 1gn ! f0; 1gm of a given input x. -
Toward Probabilistic Checking Against Non-Signaling Strategies with Constant Locality
Electronic Colloquium on Computational Complexity, Report No. 144 (2020) Toward Probabilistic Checking against Non-Signaling Strategies with Constant Locality Mohammad Mahdi Jahanara Sajin Koroth Igor Shinkar [email protected] sajin [email protected] [email protected] Simon Fraser University Simon Fraser University Simon Fraser University September 7, 2020 Abstract Non-signaling strategies are a generalization of quantum strategies that have been studied in physics over the past three decades. Recently, they have found applications in theoretical computer science, including to proving inapproximability results for linear programming and to constructing protocols for delegating computation. A central tool for these applications is probabilistically checkable proof (PCPs) systems that are sound against non-signaling strategies. In this paper we show, assuming a certain geometrical hypothesis about noise robustness of non-signaling proofs (or, equivalently, about robustness to noise of solutions to the Sherali- Adams linear program), that a slight variant of the parallel repetition of the exponential-length constant-query PCP construction due to Arora et al. (JACM 1998) is sound against non-signaling strategies with constant locality. Our proof relies on the analysis of the linearity test and agreement test (also known as the direct product test) in the non-signaling setting. Keywords: direct product testing; linearity testing; non-signaling strategies; parallel repetition; proba- bilistically checkable proofs 1 ISSN 1433-8092 Contents 1 Introduction 3 1.1 Informal statement of the result . .5 1.2 Roadmap . .6 2 Preliminaries 6 2.1 Probabilistically Checkable Proofs . .6 2.2 Parallel repetition . .7 2.3 Non-signaling functions . .7 2.4 Permutation folded repeated non-signaling functions . -
An Introduction to Johnson–Lindenstrauss Transforms
An Introduction to Johnson–Lindenstrauss Transforms Casper Benjamin Freksen∗ 2nd March 2021 Abstract Johnson–Lindenstrauss Transforms are powerful tools for reducing the dimensionality of data while preserving key characteristics of that data, and they have found use in many fields from machine learning to differential privacy and more. This note explains whatthey are; it gives an overview of their use and their development since they were introduced in the 1980s; and it provides many references should the reader wish to explore these topics more deeply. The text was previously a main part of the introduction of my PhD thesis [Fre20], but it has been adapted to be self contained and serve as a (hopefully good) starting point for readers interested in the topic. 1 The Why, What, and How 1.1 The Problem Consider the following scenario: We have some data that we wish to process but the data is too large, e.g. processing the data takes too much time, or storing the data takes too much space. A solution would be to compress the data such that the valuable parts of the data are kept and the other parts discarded. Of course, what is considered valuable is defined by the data processing we wish to apply to our data. To make our scenario more concrete let us say that our data consists of vectors in a high dimensional Euclidean space, R3, and we wish to find a transform to embed these vectors into a lower dimensional space, R<, where < 3, so that we arXiv:2103.00564v1 [cs.DS] 28 Feb 2021 ≪ can apply our data processing in this lower dimensional space and still get meaningful results. -
UC Berkeley UC Berkeley Electronic Theses and Dissertations
UC Berkeley UC Berkeley Electronic Theses and Dissertations Title Hardness of Maximum Constraint Satisfaction Permalink https://escholarship.org/uc/item/5x33g1k7 Author Chan, Siu On Publication Date 2013 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California Hardness of Maximum Constraint Satisfaction by Siu On Chan A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Elchanan Mossel, Chair Professor Luca Trevisan Professor Satish Rao Professor Michael Christ Spring 2013 Hardness of Maximum Constraint Satisfaction Creative Commons 3.0 BY: C 2013 by Siu On Chan 1 Abstract Hardness of Maximum Constraint Satisfaction by Siu On Chan Doctor of Philosophy in Computer Science University of California, Berkeley Professor Elchanan Mossel, Chair Maximum constraint satisfaction problem (Max-CSP) is a rich class of combinatorial op- timization problems. In this dissertation, we show optimal (up to a constant factor) NP- hardness for maximum constraint satisfaction problem with k variables per constraint (Max- k-CSP), whenever k is larger than the domain size. This follows from our main result con- cerning CSPs given by a predicate: a CSP is approximation resistant if its predicate contains a subgroup that is balanced pairwise independent. Our main result is related to previous works conditioned on the Unique-Games Conjecture and integrality gaps in sum-of-squares semidefinite programming hierarchies. Our main ingredient is a new gap-amplification technique inspired by XOR-lemmas. Using this technique, we also improve the NP-hardness of approximating Independent-Set on bounded-degree graphs, Almost-Coloring, Two-Prover-One-Round-Game, and various other problems. -
Adversarial Robustness of Streaming Algorithms Through Importance Sampling
Adversarial Robustness of Streaming Algorithms through Importance Sampling Vladimir Braverman Avinatan Hassidim Yossi Matias Mariano Schain Google∗ Googley Googlez Googlex Sandeep Silwal Samson Zhou MITO CMU{ June 30, 2021 Abstract Robustness against adversarial attacks has recently been at the forefront of algorithmic design for machine learning tasks. In the adversarial streaming model, an adversary gives an algorithm a sequence of adaptively chosen updates u1; : : : ; un as a data stream. The goal of the algorithm is to compute or approximate some predetermined function for every prefix of the adversarial stream, but the adversary may generate future updates based on previous outputs of the algorithm. In particular, the adversary may gradually learn the random bits internally used by an algorithm to manipulate dependencies in the input. This is especially problematic as many important problems in the streaming model require randomized algorithms, as they are known to not admit any deterministic algorithms that use sublinear space. In this paper, we introduce adversarially robust streaming algorithms for central machine learning and algorithmic tasks, such as regression and clustering, as well as their more general counterparts, subspace embedding, low-rank approximation, and coreset construction. For regression and other numerical linear algebra related tasks, we consider the row arrival streaming model. Our results are based on a simple, but powerful, observation that many importance sampling-based algorithms give rise to adversarial robustness which is in contrast to sketching based algorithms, which are very prevalent in the streaming literature but suffer from adversarial attacks. In addition, we show that the well-known merge and reduce paradigm in streaming is adversarially robust. -
Private Center Points and Learning of Halfspaces
Proceedings of Machine Learning Research vol 99:1–14, 2019 32nd Annual Conference on Learning Theory Private Center Points and Learning of Halfspaces Amos Beimel [email protected] Ben-Gurion University Shay Moran [email protected] Princeton University Kobbi Nissim [email protected] Georgetown University Uri Stemmer [email protected] Ben-Gurion University Editors: Alina Beygelzimer and Daniel Hsu Abstract We present a private agnostic learner for halfspaces over an arbitrary finite domain X ⊂ d with ∗ R sample complexity poly(d; 2log jXj). The building block for this learner is a differentially pri- ∗ vate algorithm for locating an approximate center point of m > poly(d; 2log jXj) points – a high dimensional generalization of the median function. Our construction establishes a relationship between these two problems that is reminiscent of the relation between the median and learning one-dimensional thresholds [Bun et al. FOCS ’15]. This relationship suggests that the problem of privately locating a center point may have further applications in the design of differentially private algorithms. We also provide a lower bound on the sample complexity for privately finding a point in the convex hull. For approximate differential privacy, we show a lower bound of m = Ω(d+log∗ jXj), whereas for pure differential privacy m = Ω(d log jXj). Keywords: Differential privacy, Private PAC learning, Halfspaces, Quasi-concave functions. 1. Introduction Machine learning models are often trained on sensitive personal information, e.g., when analyzing healthcare records or social media data. There is hence an increasing awareness and demand for pri- vacy preserving machine learning technology. -
László Lovász Avi Wigderson of Eötvös Loránd University of the Institute for Advanced Study, in Budapest, Hungary and Princeton, USA
2021 The Norwegian Academy of Science and Letters has decided to award the Abel Prize for 2021 to László Lovász Avi Wigderson of Eötvös Loránd University of the Institute for Advanced Study, in Budapest, Hungary and Princeton, USA, “for their foundational contributions to theoretical computer science and discrete mathematics, and their leading role in shaping them into central fields of modern mathematics.” Theoretical Computer Science (TCS) is the study of computational lens”. Discrete structures such as the power and limitations of computing. Its roots go graphs, strings, permutations are central to TCS, back to the foundational works of Kurt Gödel, Alonzo and naturally discrete mathematics and TCS Church, Alan Turing, and John von Neumann, leading have been closely allied fields. While both these to the development of real physical computers. fields have benefited immensely from more TCS contains two complementary sub-disciplines: traditional areas of mathematics, there has been algorithm design which develops efficient methods growing influence in the reverse direction as well. for a multitude of computational problems; and Applications, concepts, and techniques from TCS computational complexity, which shows inherent have motivated new challenges, opened new limitations on the efficiency of algorithms. The notion directions of research, and solved important open of polynomial-time algorithms put forward in the problems in pure and applied mathematics. 1960s by Alan Cobham, Jack Edmonds, and others, and the famous P≠NP conjecture of Stephen Cook, László Lovász and Avi Wigderson have been leading Leonid Levin, and Richard Karp had strong impact on forces in these developments over the last decades. the field and on the work of Lovász and Wigderson. -
Adversarially Robust Property-Preserving Hash Functions
Adversarially robust property-preserving hash functions The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Boyle, Elette et al. “Adversarially robust property-preserving hash functions.” Paper in the Leibniz International Proceedings in Informatics, LIPIcs, 124, 16, 10th Innovations in Theoretical Computer Science (ITCS 2019), San Diego, California, January 10-12, 2019, Leibniz Center for Informatics: 1-20 © 2019 The Author(s) As Published 10.4230/LIPIcs.ITCS.2019.16 Publisher Leibniz Center for Informatics Version Final published version Citable link https://hdl.handle.net/1721.1/130258 Terms of Use Creative Commons Attribution 4.0 International license Detailed Terms https://creativecommons.org/licenses/by/4.0/ Adversarially Robust Property-Preserving Hash Functions Elette Boyle1 IDC Herzliya, Kanfei Nesharim Herzliya, Israel [email protected] Rio LaVigne2 MIT CSAIL, 32 Vassar Street, Cambridge MA, 02139 USA [email protected] Vinod Vaikuntanathan3 MIT CSAIL, 32 Vassar Street, Cambridge MA, 02139 USA [email protected] Abstract Property-preserving hashing is a method of compressing a large input x into a short hash h(x) in such a way that given h(x) and h(y), one can compute a property P (x, y) of the original inputs. The idea of property-preserving hash functions underlies sketching, compressed sensing and locality-sensitive hashing. Property-preserving hash functions are usually probabilistic: they use the random choice of a hash function from a family to achieve compression, and as a consequence, err on some inputs. Traditionally, the notion of correctness for these hash functions requires that for every two inputs x and y, the probability that h(x) and h(y) mislead us into a wrong prediction of P (x, y) is negligible. -
Adversarial Laws of Large Numbers and Optimal Regret in Online Classification
Adversarial Laws of Large Numbers and Optimal Regret in Online Classification Noga Alon* Omri Ben-Eliezer† Yuval Dagan‡ Shay Moran§ Moni Naor¶ Eylon Yogev|| Abstract Laws of large numbers guarantee that given a large enough sample from some population, the measure of any fixed sub-population is well-estimated by its frequency in the sample. We study laws of large numbers in sampling processes that can affect the environment they are acting upon and interact with it. Specifically, we consider the sequential sampling model proposed by Ben-Eliezer and Yogev (2020), and characterize the classes which admit a uniform law of large numbers in this model: these are exactly the classes that are online learnable. Our characterization may be interpreted as an online analogue to the equivalence between learnability and uniform convergence in statistical (PAC) learning. The sample-complexity bounds we obtain are tight for many parameter regimes, and as an application, we determine the optimal regret bounds in online learning, stated in terms of Littlestone’s dimension, thus resolving the main open question from Ben-David, Pal,´ and Shalev-Shwartz (2009), which was also posed by Rakhlin, Sridharan, and Tewari (2015). *Department of Mathematics, Princeton University, Princeton, New Jersey, USA and Schools of Mathematics and Computer Science, Tel Aviv University, Tel Aviv, Israel. Research supported in part by NSF grant DMS-1855464, BSF grant 2018267 and the Simons Foundation. Email: [email protected]. †Center for Mathematical Sciences and Applications, Harvard University, Massachusetts, USA. Research partially conducted while the author was at Weizmann Institute of Science, supported in part by a grant from the Israel Science Foundation (no.