首页 > 最新文献

Proceedings of the forty-eighth annual ACM symposium on Theory of Computing最新文献

英文 中文
A polynomial lower bound for testing monotonicity 检验单调性的多项式下界
Pub Date : 2015-11-16 DOI: 10.1145/2897518.2897567
Aleksandrs Belovs, Eric Blais
We show that every algorithm for testing n-variate Boolean functions for monotonicityhas query complexity Ω(n1/4). All previous lower bounds for this problem were designed for non-adaptive algorithms and, as a result, the best previous lower bound for general (possibly adaptive) monotonicity testers was only Ω(logn). Combined with the query complexity of the non-adaptive monotonicity tester of Khot, Minzer, and Safra (FOCS 2015), our lower bound shows that adaptivity can result in at most a quadratic reduction in the query complexity for testing monotonicity. By contrast, we show that there is an exponential gap between the query complexity of adaptive and non-adaptive algorithms for testing regular linear threshold functions (LTFs) for monotonicity. Chen, De, Servedio, and Tan (STOC 2015)recently showed that non-adaptive algorithms require almost Ω(n1/2) queries for this task. We introduce a new adaptive monotonicity testing algorithm which has query complexity O(logn) when the input is a regular LTF.
我们证明了每个用于测试n变量布尔函数单调性的算法都具有查询复杂度Ω(n1/4)。该问题的所有先前的下界都是为非自适应算法设计的,因此,一般(可能自适应)单调性测试器的最佳先前下界仅为Ω(logn)。结合Khot, Minzer和Safra (FOCS 2015)的非自适应单调性测试仪的查询复杂度,我们的下界表明,自适应最多可以使测试单调性的查询复杂度降低二次。通过对比,我们发现用于测试正则线性阈值函数(ltf)单调性的自适应和非自适应算法的查询复杂度之间存在指数差距。Chen, De, Servedio和Tan (STOC 2015)最近表明,非自适应算法几乎需要Ω(n /2)次查询才能完成此任务。提出了一种新的自适应单调性测试算法,该算法在输入为正则LTF时查询复杂度为O(logn)。
{"title":"A polynomial lower bound for testing monotonicity","authors":"Aleksandrs Belovs, Eric Blais","doi":"10.1145/2897518.2897567","DOIUrl":"https://doi.org/10.1145/2897518.2897567","url":null,"abstract":"We show that every algorithm for testing n-variate Boolean functions for monotonicityhas query complexity Ω(n1/4). All previous lower bounds for this problem were designed for non-adaptive algorithms and, as a result, the best previous lower bound for general (possibly adaptive) monotonicity testers was only Ω(logn). Combined with the query complexity of the non-adaptive monotonicity tester of Khot, Minzer, and Safra (FOCS 2015), our lower bound shows that adaptivity can result in at most a quadratic reduction in the query complexity for testing monotonicity. By contrast, we show that there is an exponential gap between the query complexity of adaptive and non-adaptive algorithms for testing regular linear threshold functions (LTFs) for monotonicity. Chen, De, Servedio, and Tan (STOC 2015)recently showed that non-adaptive algorithms require almost Ω(n1/2) queries for this task. We introduce a new adaptive monotonicity testing algorithm which has query complexity O(logn) when the input is a regular LTF.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116268119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
A size-free CLT for poisson multinomials and its applications 泊松多项式的无尺寸CLT及其应用
Pub Date : 2015-11-11 DOI: 10.1145/2897518.2897519
C. Daskalakis, Anindya De, Gautam Kamath, Christos Tzamos
An (n,k)-Poisson Multinomial Distribution (PMD) is the distribution of the sum of n independent random vectors supported on the set Bk={e1,…,ek} of standard basis vectors in ℝk. We show that any (n,k)-PMD is poly(k/σ)-close in total variation distance to the (appropriately discretized) multi-dimensional Gaussian with the same first two moments, removing the dependence on n from the Central Limit Theorem of Valiant and Valiant. Interestingly, our CLT is obtained by bootstrapping the Valiant-Valiant CLT itself through the structural characterization of PMDs shown in recent work by Daskalakis, Kamath and Tzamos. In turn, our stronger CLT can be leveraged to obtain an efficient PTAS for approximate Nash equilibria in anonymous games, significantly improving the state of the art, and matching qualitatively the running time dependence on n and 1/є of the best known algorithm for two-strategy anonymous games. Our new CLT also enables the construction of covers for the set of (n,k)-PMDs, which are proper and whose size is shown to be essentially optimal. Our cover construction combines our CLT with the Shapley-Folkman theorem and recent sparsification results for Laplacian matrices by Batson, Spielman, and Srivastava. Our cover size lower bound is based on an algebraic geometric construction. Finally, leveraging the structural properties of the Fourier spectrum of PMDs we show that these distributions can be learned from Ok(1/є2) samples in polyk(1/є)-time, removing the quasi-polynomial dependence of the running time on 1/є from prior work.
(n,k)-泊松多项式分布(PMD)是在集合Bk={e1,…,ek}上支持的n个独立随机向量的和的分布。我们证明了任意(n,k)-PMD在总变异距离上与具有相同前两个矩的(适当离散的)多维高斯函数聚(k/σ)接近,从而消除了Valiant和Valiant的中心极限定理对n的依赖。有趣的是,我们的CLT是通过Daskalakis, Kamath和Tzamos最近的工作中显示的pmd的结构特征来引导Valiant-Valiant CLT本身获得的。反过来,我们更强大的CLT可以用来获得匿名博弈中近似纳什均衡的有效PTAS,显着提高了技术水平,并定性地匹配最著名的双策略匿名博弈算法对n和1/ n的运行时间依赖。我们的新CLT还可以为(n,k)- pmd集构建覆盖层,这些覆盖层是合适的,其大小被证明是基本最佳的。我们的覆盖结构结合了我们的CLT与Shapley-Folkman定理和最近由Batson, Spielman和Srivastava对拉普拉斯矩阵的稀疏化结果。我们的覆盖尺寸下界是基于一个代数几何结构。最后,利用pmd傅立叶谱的结构特性,我们表明这些分布可以在polyk(1/ k)时间内从Ok(1/є2)样本中学习,消除了先前工作中运行时间对1/ k的拟多项式依赖。
{"title":"A size-free CLT for poisson multinomials and its applications","authors":"C. Daskalakis, Anindya De, Gautam Kamath, Christos Tzamos","doi":"10.1145/2897518.2897519","DOIUrl":"https://doi.org/10.1145/2897518.2897519","url":null,"abstract":"An (n,k)-Poisson Multinomial Distribution (PMD) is the distribution of the sum of n independent random vectors supported on the set Bk={e1,…,ek} of standard basis vectors in ℝk. We show that any (n,k)-PMD is poly(k/σ)-close in total variation distance to the (appropriately discretized) multi-dimensional Gaussian with the same first two moments, removing the dependence on n from the Central Limit Theorem of Valiant and Valiant. Interestingly, our CLT is obtained by bootstrapping the Valiant-Valiant CLT itself through the structural characterization of PMDs shown in recent work by Daskalakis, Kamath and Tzamos. In turn, our stronger CLT can be leveraged to obtain an efficient PTAS for approximate Nash equilibria in anonymous games, significantly improving the state of the art, and matching qualitatively the running time dependence on n and 1/є of the best known algorithm for two-strategy anonymous games. Our new CLT also enables the construction of covers for the set of (n,k)-PMDs, which are proper and whose size is shown to be essentially optimal. Our cover construction combines our CLT with the Shapley-Folkman theorem and recent sparsification results for Laplacian matrices by Batson, Spielman, and Srivastava. Our cover size lower bound is based on an algebraic geometric construction. Finally, leveraging the structural properties of the Fourier spectrum of PMDs we show that these distributions can be learned from Ok(1/є2) samples in polyk(1/є)-time, removing the quasi-polynomial dependence of the running time on 1/є from prior work.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"29 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123498620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
The fourier transform of poisson multinomial distributions and its algorithmic applications 泊松多项式分布的傅里叶变换及其算法应用
Pub Date : 2015-11-11 DOI: 10.1145/2897518.2897552
Ilias Diakonikolas, D. Kane, Alistair Stewart
An (n, k)-Poisson Multinomial Distribution (PMD) is a random variable of the form X = ∑i=1n Xi, where the Xi’s are independent random vectors supported on the set of standard basis vectors in k. In this paper, we obtain a refined structural understanding of PMDs by analyzing their Fourier transform. As our core structural result, we prove that the Fourier transform of PMDs is approximately sparse, i.e., its L1-norm is small outside a small set. By building on this result, we obtain the following applications: Learning Theory. We give the first computationally efficient learning algorithm for PMDs under the total variation distance. Our algorithm learns an (n, k)-PMD within variation distance ε using a near-optimal sample size of Ok(1/ε2), and runs in time Ok(1/ε2) · logn. Previously, no algorithm with a (1/ε) runtime was known, even for k=3. Game Theory. We give the first efficient polynomial-time approximation scheme (EPTAS) for computing Nash equilibria in anonymous games. For normalized anonymous games with n players and k strategies, our algorithm computes a well-supported ε-Nash equilibrium in time nO(k3) · (k/ε)O(k3log(k/ε)/loglog(k/ε))k−1. The best previous algorithm for this problem had running time n(f(k)/ε)k, where f(k) = Ω(kk2), for any k>2. Statistics. We prove a multivariate central limit theorem (CLT) that relates an arbitrary PMD to a discretized multivariate Gaussian with the same mean and covariance, in total variation distance. Our new CLT strengthens the CLT of Valiant and Valiant by removing the dependence on n in the error bound. Along the way we prove several new structural results of independent interest about PMDs. These include: (i) a robust moment-matching lemma, roughly stating that two PMDs that approximately agree on their low-degree parameter moments are close in variation distance; (ii) near-optimal size proper ε-covers for PMDs in total variation distance (constructive upper bound and nearly-matching lower bound). In addition to Fourier analysis, we employ a number of analytic tools, including the saddlepoint method from complex analysis, that may find other applications.
作为我们的核心结构结果,我们证明了pmd的傅里叶变换是近似稀疏的,即它的l1范数在小集合外是小的。在此基础上,我们得到以下应用:学习理论。在总变异距离下,给出了首个计算效率高的PMDs学习算法。算法在变异距离ε内学习(n, k)-PMD,样本量为Ok(1/ε2),运行时间为Ok(1/ε2)·logn。以前,即使k=3,也没有已知的运行时间为(1/ε)的算法。游戏理论。本文给出了计算匿名对策纳什均衡的第一个有效的多项式时间逼近格式。对于n个参与者和k个策略的归一化匿名博弈,我们的算法在nO(k3)·(k/ε)O(k3log(k/ε)/loglog(k/ε))k−1时间内计算出一个支持良好的ε-纳什均衡。对于这个问题,以前最好的算法的运行时间是n(f(k)/ε)k,其中f(k) = Ω(kk2),对于任何k>2。统计数据。我们证明了一个多变量中心极限定理(CLT),该定理将任意PMD与具有相同均值和协方差的离散多变量高斯在总变异距离上联系起来。我们的新CLT通过消除误差界中对n的依赖来增强Valiant和Valiant的CLT。在此过程中,我们证明了几个关于pmd的独立兴趣的新结构结果。这包括:(i)一个鲁棒矩匹配引理,粗略地说明两个低阶参数矩近似一致的pmd在变化距离上接近;(ii) PMDs在总变异距离(构造上界和近似匹配下界)上的近似最优尺寸适当ε-盖。除了傅里叶分析之外,我们还使用了许多分析工具,包括复分析中的鞍点方法,这些工具可能会找到其他应用。
{"title":"The fourier transform of poisson multinomial distributions and its algorithmic applications","authors":"Ilias Diakonikolas, D. Kane, Alistair Stewart","doi":"10.1145/2897518.2897552","DOIUrl":"https://doi.org/10.1145/2897518.2897552","url":null,"abstract":"An (n, k)-Poisson Multinomial Distribution (PMD) is a random variable of the form X = ∑i=1n Xi, where the Xi’s are independent random vectors supported on the set of standard basis vectors in k. In this paper, we obtain a refined structural understanding of PMDs by analyzing their Fourier transform. As our core structural result, we prove that the Fourier transform of PMDs is approximately sparse, i.e., its L1-norm is small outside a small set. By building on this result, we obtain the following applications: Learning Theory. We give the first computationally efficient learning algorithm for PMDs under the total variation distance. Our algorithm learns an (n, k)-PMD within variation distance ε using a near-optimal sample size of Ok(1/ε2), and runs in time Ok(1/ε2) · logn. Previously, no algorithm with a (1/ε) runtime was known, even for k=3. Game Theory. We give the first efficient polynomial-time approximation scheme (EPTAS) for computing Nash equilibria in anonymous games. For normalized anonymous games with n players and k strategies, our algorithm computes a well-supported ε-Nash equilibrium in time nO(k3) · (k/ε)O(k3log(k/ε)/loglog(k/ε))k−1. The best previous algorithm for this problem had running time n(f(k)/ε)k, where f(k) = Ω(kk2), for any k>2. Statistics. We prove a multivariate central limit theorem (CLT) that relates an arbitrary PMD to a discretized multivariate Gaussian with the same mean and covariance, in total variation distance. Our new CLT strengthens the CLT of Valiant and Valiant by removing the dependence on n in the error bound. Along the way we prove several new structural results of independent interest about PMDs. These include: (i) a robust moment-matching lemma, roughly stating that two PMDs that approximately agree on their low-degree parameter moments are close in variation distance; (ii) near-optimal size proper ε-covers for PMDs in total variation distance (constructive upper bound and nearly-matching lower bound). In addition to Fourier analysis, we employ a number of analytic tools, including the saddlepoint method from complex analysis, that may find other applications.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133018193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Algorithmic stability for adaptive data analysis 自适应数据分析的算法稳定性
Pub Date : 2015-11-08 DOI: 10.1145/2897518.2897566
Raef Bassily, Kobbi Nissim, Adam D. Smith, T. Steinke, Uri Stemmer, Jonathan Ullman
Adaptivity is an important feature of data analysis - the choice of questions to ask about a dataset often depends on previous interactions with the same dataset. However, statistical validity is typically studied in a nonadaptive model, where all questions are specified before the dataset is drawn. Recent work by Dwork et al. (STOC, 2015) and Hardt and Ullman (FOCS, 2014) initiated a general formal study of this problem, and gave the first upper and lower bounds on the achievable generalization error for adaptive data analysis. Specifically, suppose there is an unknown distribution P and a set of n independent samples x is drawn from P. We seek an algorithm that, given x as input, accurately answers a sequence of adaptively chosen ``queries'' about the unknown distribution P. How many samples n must we draw from the distribution, as a function of the type of queries, the number of queries, and the desired level of accuracy? In this work we make two new contributions towards resolving this question: We give upper bounds on the number of samples n that are needed to answer statistical queries. The bounds improve and simplify the work of Dwork et al. (STOC, 2015), and have been applied in subsequent work by those authors (Science, 2015; NIPS, 2015). We prove the first upper bounds on the number of samples required to answer more general families of queries. These include arbitrary low-sensitivity queries and an important class of optimization queries (alternatively, risk minimization queries). As in Dwork et al., our algorithms are based on a connection with algorithmic stability in the form of differential privacy. We extend their work by giving a quantitatively optimal, more general, and simpler proof of their main theorem that the stability notion guaranteed by differential privacy implies low generalization error. We also show that weaker stability guarantees such as bounded KL divergence and total variation distance lead to correspondingly weaker generalization guarantees.
适应性是数据分析的一个重要特征——对数据集提出问题的选择通常取决于以前与同一数据集的交互。然而,统计有效性通常是在非自适应模型中研究的,其中所有问题都是在绘制数据集之前指定的。Dwork等人(STOC, 2015)和Hardt和Ullman (FOCS, 2014)最近的工作启动了对该问题的一般正式研究,并给出了自适应数据分析可实现泛化误差的第一个上界和下界。具体来说,假设存在一个未知分布P,并且从P中抽取了一组n个独立样本x。我们寻求一种算法,在给定x作为输入的情况下,准确地回答一系列自适应选择的关于未知分布P的“查询”。作为查询类型、查询数量和所需精度水平的函数,我们必须从分布中抽取多少个样本n ?在这项工作中,我们为解决这个问题做出了两个新的贡献:我们给出了回答统计查询所需的样本数量n的上限。边界改进和简化了Dwork等人(STOC, 2015)的工作,并已被这些作者应用于后续工作(Science, 2015;少量的酒,2015)。我们证明了回答更一般的查询族所需的样本数量的第一个上界。这些查询包括任意的低灵敏度查询和一类重要的优化查询(或者,风险最小化查询)。与Dwork等人一样,我们的算法基于与差分隐私形式的算法稳定性的联系。我们通过给出一个定量最优的、更一般的、更简单的证明来扩展他们的工作,证明他们的主要定理,即微分隐私保证的稳定性概念意味着低泛化误差。我们还表明,有界KL散度和总变异距离等较弱的稳定性保证导致相应较弱的泛化保证。
{"title":"Algorithmic stability for adaptive data analysis","authors":"Raef Bassily, Kobbi Nissim, Adam D. Smith, T. Steinke, Uri Stemmer, Jonathan Ullman","doi":"10.1145/2897518.2897566","DOIUrl":"https://doi.org/10.1145/2897518.2897566","url":null,"abstract":"Adaptivity is an important feature of data analysis - the choice of questions to ask about a dataset often depends on previous interactions with the same dataset. However, statistical validity is typically studied in a nonadaptive model, where all questions are specified before the dataset is drawn. Recent work by Dwork et al. (STOC, 2015) and Hardt and Ullman (FOCS, 2014) initiated a general formal study of this problem, and gave the first upper and lower bounds on the achievable generalization error for adaptive data analysis. Specifically, suppose there is an unknown distribution P and a set of n independent samples x is drawn from P. We seek an algorithm that, given x as input, accurately answers a sequence of adaptively chosen ``queries'' about the unknown distribution P. How many samples n must we draw from the distribution, as a function of the type of queries, the number of queries, and the desired level of accuracy? In this work we make two new contributions towards resolving this question: We give upper bounds on the number of samples n that are needed to answer statistical queries. The bounds improve and simplify the work of Dwork et al. (STOC, 2015), and have been applied in subsequent work by those authors (Science, 2015; NIPS, 2015). We prove the first upper bounds on the number of samples required to answer more general families of queries. These include arbitrary low-sensitivity queries and an important class of optimization queries (alternatively, risk minimization queries). As in Dwork et al., our algorithms are based on a connection with algorithmic stability in the form of differential privacy. We extend their work by giving a quantitatively optimal, more general, and simpler proof of their main theorem that the stability notion guaranteed by differential privacy implies low generalization error. We also show that weaker stability guarantees such as bounded KL divergence and total variation distance lead to correspondingly weaker generalization guarantees.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 244
The sample complexity of auctions with side information 带有侧面信息的拍卖的样本复杂性
Pub Date : 2015-11-07 DOI: 10.1145/2897518.2897553
Nikhil R. Devanur, Zhiyi Huang, Alexandros Psomas
Traditionally, the Bayesian optimal auction design problem has been considered either when the bidder values are i.i.d, or when each bidder is individually identifiable via her value distribution. The latter is a reasonable approach when the bidders can be classified into a few categories, but there are many instances where the classification of bidders is a continuum. For example, the classification of the bidders may be based on their annual income, their propensity to buy an item based on past behavior, or in the case of ad auctions, the click through rate of their ads. We introduce an alternate model that captures this aspect, where bidders are a priori identical, but can be distinguished based (only) on some side information the auctioneer obtains at the time of the auction. We extend the sample complexity approach of Dhangwatnotai et al. and Cole and Roughgarden to this model and obtain almost matching upper and lower bounds. As an aside, we obtain a revenue monotonicity lemma which may be of independent interest. We also show how to use Empirical Risk Minimization techniques to improve the sample complexity bound of Cole and Roughgarden for the non-identical but independent value distribution case.
传统上,贝叶斯最优拍卖设计问题要么考虑竞标者的价值是独立的,要么考虑每个竞标者的价值分布是可识别的。当投标人可以分为几个类别时,后者是一种合理的方法,但在许多情况下,投标人的分类是一个连续体。例如,对竞标者的分类可能是基于他们的年收入,他们基于过去的行为购买物品的倾向,或者在广告拍卖的情况下,他们的广告的点击率。我们引入了一个捕捉这方面的替代模型,其中竞标者是先验相同的,但可以根据拍卖师在拍卖时获得的一些附带信息来区分。我们将Dhangwatnotai et al.和Cole and Roughgarden的样本复杂度方法推广到该模型,得到了几乎匹配的上界和下界。作为题外话,我们得到了一个有独立意义的收入单调引理。我们还展示了如何使用经验风险最小化技术来改进Cole和Roughgarden的样本复杂性界,以解决非相同但独立的值分布情况。
{"title":"The sample complexity of auctions with side information","authors":"Nikhil R. Devanur, Zhiyi Huang, Alexandros Psomas","doi":"10.1145/2897518.2897553","DOIUrl":"https://doi.org/10.1145/2897518.2897553","url":null,"abstract":"Traditionally, the Bayesian optimal auction design problem has been considered either when the bidder values are i.i.d, or when each bidder is individually identifiable via her value distribution. The latter is a reasonable approach when the bidders can be classified into a few categories, but there are many instances where the classification of bidders is a continuum. For example, the classification of the bidders may be based on their annual income, their propensity to buy an item based on past behavior, or in the case of ad auctions, the click through rate of their ads. We introduce an alternate model that captures this aspect, where bidders are a priori identical, but can be distinguished based (only) on some side information the auctioneer obtains at the time of the auction. We extend the sample complexity approach of Dhangwatnotai et al. and Cole and Roughgarden to this model and obtain almost matching upper and lower bounds. As an aside, we obtain a revenue monotonicity lemma which may be of independent interest. We also show how to use Empirical Risk Minimization techniques to improve the sample complexity bound of Cole and Roughgarden for the non-identical but independent value distribution case.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116639683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 101
Separations in query complexity using cheat sheets 使用小抄表分隔查询复杂度
Pub Date : 2015-11-05 DOI: 10.1145/2897518.2897644
S. Aaronson, S. Ben-David, Robin Kothari
We show a power 2.5 separation between bounded-error randomized and quantum query complexity for a total Boolean function, refuting the widely believed conjecture that the best such separation could only be quadratic (from Grover's algorithm). We also present a total function with a power 4 separation between quantum query complexity and approximate polynomial degree, showing severe limitations on the power of the polynomial method. Finally, we exhibit a total function with a quadratic gap between quantum query complexity and certificate complexity, which is optimal (up to log factors). These separations are shown using a new, general technique that we call the cheat sheet technique, which builds upon the techniques of Ambainis et al. [STOC 2016]. The technique is based on a generic transformation that converts any (possibly partial) function into a new total function with desirable properties for showing separations. The framework also allows many known separations, including some recent breakthrough results of Ambainis et al. [STOC 2016], to be shown in a unified manner.
我们展示了总布尔函数的有界误差随机查询复杂度和量子查询复杂度之间的幂2.5分离,驳斥了人们普遍认为最好的这种分离只能是二次的猜想(来自Grover算法)。我们还提出了一个量子查询复杂度和近似多项式度之间的幂4分离的总函数,显示了多项式方法的幂的严重局限性。最后,我们展示了量子查询复杂性和证书复杂性之间的二次差的总函数,这是最优的(最多为对数因子)。这些分离使用了一种新的通用技术,我们称之为小抄技术,该技术建立在Ambainis等人的技术基础上[STOC 2016]。该技术基于将任何(可能是部分)函数转换为具有显示分离所需属性的新全函数的泛型转换。该框架还允许以统一的方式显示许多已知的分离,包括Ambainis等人[STOC 2016]最近的一些突破性结果。
{"title":"Separations in query complexity using cheat sheets","authors":"S. Aaronson, S. Ben-David, Robin Kothari","doi":"10.1145/2897518.2897644","DOIUrl":"https://doi.org/10.1145/2897518.2897644","url":null,"abstract":"We show a power 2.5 separation between bounded-error randomized and quantum query complexity for a total Boolean function, refuting the widely believed conjecture that the best such separation could only be quadratic (from Grover's algorithm). We also present a total function with a power 4 separation between quantum query complexity and approximate polynomial degree, showing severe limitations on the power of the polynomial method. Finally, we exhibit a total function with a quadratic gap between quantum query complexity and certificate complexity, which is optimal (up to log factors). These separations are shown using a new, general technique that we call the cheat sheet technique, which builds upon the techniques of Ambainis et al. [STOC 2016]. The technique is based on a generic transformation that converts any (possibly partial) function into a new total function with desirable properties for showing separations. The framework also allows many known separations, including some recent breakthrough results of Ambainis et al. [STOC 2016], to be shown in a unified manner.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127537742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
Base collapse of holographic algorithms 全息算法的基础崩溃
Pub Date : 2015-11-04 DOI: 10.1145/2897518.2897560
Mingji Xia
A holographic algorithm solves a problem in a domain of size n, by reducing it to counting perfect matchings in planar graphs. It may simulate a n-value variable by a bunch of t matchgate bits, which has 2t values. The transformation in the simulation can be expressed as a n × 2t matrix M, called the base of the holographic algorithm. We wonder whether more matchgate bits bring us more powerful holographic algorithms. In another word, whether we can solve the same original problem, with a collapsed base of size n × 2r, where r
全息算法解决了一个大小为n的域上的问题,通过将其简化为计算平面图形中的完美匹配。它可以通过一堆t匹配门位来模拟一个n值的变量,它有2t个值。仿真中的变换可以表示为n × 2t矩阵M,称为全息算法的基。我们想知道更多的匹配门位是否会给我们带来更强大的全息算法。换句话说,我们是否可以解决相同的原始问题,具有大小为n × 2r的坍塌基,其中r
{"title":"Base collapse of holographic algorithms","authors":"Mingji Xia","doi":"10.1145/2897518.2897560","DOIUrl":"https://doi.org/10.1145/2897518.2897560","url":null,"abstract":"A holographic algorithm solves a problem in a domain of size n, by reducing it to counting perfect matchings in planar graphs. It may simulate a n-value variable by a bunch of t matchgate bits, which has 2t values. The transformation in the simulation can be expressed as a n × 2t matrix M, called the base of the holographic algorithm. We wonder whether more matchgate bits bring us more powerful holographic algorithms. In another word, whether we can solve the same original problem, with a collapsed base of size n × 2r, where r<t. Base collapse is discovered for small domain n=2,3,4. For n=3, 4, the base collapse is proved under the condition that there is a full rank generator. We prove for any n, the base collapse to a r≤ ⌊ logn ⌋, under some similar conditions. One of the conditions is that the original problem is defined by one symmetric function. In the proof, we utilize elementary matchgate transformations instead of matchgate identities.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126233523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
How robust are reconstruction thresholds for community detection? 社区检测的重建阈值有多鲁棒?
Pub Date : 2015-11-04 DOI: 10.1145/2897518.2897573
Ankur Moitra, William Perry, Alexander S. Wein
The stochastic block model is one of the oldest and most ubiquitous models for studying clustering and community detection. In an exciting sequence of developments, motivated by deep but non-rigorous ideas from statistical physics, Decelle et al. conjectured a sharp threshold for when community detection is possible in the sparse regime. Mossel, Neeman and Sly and Massoulie proved the conjecture and gave matching algorithms and lower bounds. Here we revisit the stochastic block model from the perspective of semirandom models where we allow an adversary to make `helpful' changes that strengthen ties within each community and break ties between them. We show a surprising result that these `helpful' changes can shift the information-theoretic threshold, making the community detection problem strictly harder. We complement this by showing that an algorithm based on semidefinite programming (which was known to get close to the threshold) continues to work in the semirandom model (even for partial recovery). This suggests that algorithms based on semidefinite programming are robust in ways that any algorithm meeting the information-theoretic threshold cannot be. These results point to an interesting new direction: Can we find robust, semirandom analogues to some of the classical, average-case thresholds in statistics? We also explore this question in the broadcast tree model, and we show that the viewpoint of semirandom models can help explain why some algorithms are preferred to others in practice, in spite of the gaps in their statistical performance on random models.
随机块模型是研究聚类和社区检测的最古老和最普遍的模型之一。在一系列令人兴奋的发展中,Decelle等人受到统计物理学深刻但不严谨的思想的激励,推测出在稀疏状态下社区检测可能存在的一个尖锐阈值。Mossel、Neeman、Sly和Massoulie证明了这个猜想,并给出了匹配算法和下界。在这里,我们从半随机模型的角度重新审视随机块模型,我们允许对手做出“有益的”改变,加强每个社区内部的联系,并打破它们之间的联系。我们展示了一个令人惊讶的结果,这些“有用的”变化可以改变信息论的阈值,使社区检测问题变得更加困难。我们通过展示基于半确定规划(已知接近阈值)的算法继续在半随机模型中工作(即使是部分恢复)来补充这一点。这表明基于半确定规划的算法具有鲁棒性,这是任何满足信息论阈值的算法都无法做到的。这些结果指向了一个有趣的新方向:我们能否在统计学中找到一些经典的、平均情况阈值的可靠的、半随机的类似物?我们还在广播树模型中探讨了这个问题,我们表明,半随机模型的观点可以帮助解释为什么一些算法在实践中比其他算法更受欢迎,尽管它们在随机模型上的统计性能存在差距。
{"title":"How robust are reconstruction thresholds for community detection?","authors":"Ankur Moitra, William Perry, Alexander S. Wein","doi":"10.1145/2897518.2897573","DOIUrl":"https://doi.org/10.1145/2897518.2897573","url":null,"abstract":"The stochastic block model is one of the oldest and most ubiquitous models for studying clustering and community detection. In an exciting sequence of developments, motivated by deep but non-rigorous ideas from statistical physics, Decelle et al. conjectured a sharp threshold for when community detection is possible in the sparse regime. Mossel, Neeman and Sly and Massoulie proved the conjecture and gave matching algorithms and lower bounds. Here we revisit the stochastic block model from the perspective of semirandom models where we allow an adversary to make `helpful' changes that strengthen ties within each community and break ties between them. We show a surprising result that these `helpful' changes can shift the information-theoretic threshold, making the community detection problem strictly harder. We complement this by showing that an algorithm based on semidefinite programming (which was known to get close to the threshold) continues to work in the semirandom model (even for partial recovery). This suggests that algorithms based on semidefinite programming are robust in ways that any algorithm meeting the information-theoretic threshold cannot be. These results point to an interesting new direction: Can we find robust, semirandom analogues to some of the classical, average-case thresholds in statistics? We also explore this question in the broadcast tree model, and we show that the viewpoint of semirandom models can help explain why some algorithms are preferred to others in practice, in spite of the gaps in their statistical performance on random models.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Basis collapse for holographic algorithms over all domain sizes 在所有领域尺寸全息算法的基崩溃
Pub Date : 2015-11-03 DOI: 10.1145/2897518.2897546
Sitan Chen
The theory of holographic algorithms introduced by Valiant represents a novel approach to achieving polynomial-time algorithms for seemingly intractable counting problems via a reduction to counting planar perfect matchings and a linear change of basis. Two fundamental parameters in holographic algorithms are the domain size and the basis size. Roughly, the domain size is the range of colors involved in the counting problem at hand (e.g. counting graph k-colorings is a problem over domain size k), while the basis size captures the dimensionality of the representation of those colors. A major open problem has been: for a given k, what is the smallest ℓ for which any holographic algorithm for a problem over domain size k "collapses to" (can be simulated by) a holographic algorithm with basis size ℓ? Cai and Lu showed in 2008 that over domain size 2, basis size 1 suffices, opening the door to an extensive line of work on the structural theory of holographic algorithms over the Boolean domain. Cai and Fu later showed for signatures of full rank that over domain sizes 3 and 4, basis sizes 1 and 2, respectively, suffice, and they conjectured that over domain size k there is a collapse to basis size ⌊log2 k⌋. In this work, we resolve this conjecture in the affirmative for signatures of full rank for all k.
Valiant介绍的全息算法理论代表了一种新的方法,通过减少对平面完美匹配的计数和基的线性变化来实现看似棘手的计数问题的多项式时间算法。全息算法的两个基本参数是域尺寸和基尺寸。粗略地说,域大小是涉及到手头的计数问题的颜色范围(例如,计数图k-着色是一个超过域大小k的问题),而基大小捕获这些颜色表示的维度。一个主要的开放问题是:对于给定的k,对于一个域大小为k的问题,任何全息算法“坍缩”为(可以用)基大小为r的全息算法来模拟的最小的r是多少?Cai和Lu在2008年表明,在域大小为2的情况下,基大小为1就足够了,这为布尔域上全息算法的结构理论的广泛研究打开了大门。Cai和Fu后来证明,对于满秩的签名,在大小为3和4的域上,基大小分别为1和2就足够了,并且他们推测,在大小为k的域上,存在一个坍缩到大小为⌊log2 k⌋的基。在这项工作中,我们肯定地解决了所有k的满秩签名的这个猜想。
{"title":"Basis collapse for holographic algorithms over all domain sizes","authors":"Sitan Chen","doi":"10.1145/2897518.2897546","DOIUrl":"https://doi.org/10.1145/2897518.2897546","url":null,"abstract":"The theory of holographic algorithms introduced by Valiant represents a novel approach to achieving polynomial-time algorithms for seemingly intractable counting problems via a reduction to counting planar perfect matchings and a linear change of basis. Two fundamental parameters in holographic algorithms are the domain size and the basis size. Roughly, the domain size is the range of colors involved in the counting problem at hand (e.g. counting graph k-colorings is a problem over domain size k), while the basis size captures the dimensionality of the representation of those colors. A major open problem has been: for a given k, what is the smallest ℓ for which any holographic algorithm for a problem over domain size k \"collapses to\" (can be simulated by) a holographic algorithm with basis size ℓ? Cai and Lu showed in 2008 that over domain size 2, basis size 1 suffices, opening the door to an extensive line of work on the structural theory of holographic algorithms over the Boolean domain. Cai and Fu later showed for signatures of full rank that over domain sizes 3 and 4, basis sizes 1 and 2, respectively, suffice, and they conjectured that over domain size k there is a collapse to basis size ⌊log2 k⌋. In this work, we resolve this conjecture in the affirmative for signatures of full rank for all k.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A lower bound for the distributed Lovász local lemma 分布式Lovász局部引理的下界
Pub Date : 2015-11-03 DOI: 10.1145/2897518.2897570
S. Brandt, O. Fischer, J. Hirvonen, Barbara Keller, Tuomo Lempiäinen, J. Rybicki, J. Suomela, Jara Uitto
We show that any randomised Monte Carlo distributed algorithm for the Lovász local lemma requires Omega(log log n) communication rounds, assuming that it finds a correct assignment with high probability. Our result holds even in the special case of d = O(1), where d is the maximum degree of the dependency graph. By prior work, there are distributed algorithms for the Lovász local lemma with a running time of O(log n) rounds in bounded-degree graphs, and the best lower bound before our work was Omega(log* n) rounds [Chung et al. 2014].
我们证明了任何用于Lovász局部引理的随机蒙特卡罗分布式算法都需要Omega(log log n)轮通信,假设它以高概率找到正确的分配。我们的结果即使在d = O(1)的特殊情况下也成立,其中d是依赖图的最大程度。根据之前的工作,Lovász局部引理的分布式算法在有界度图中运行时间为O(log n)轮,在我们的工作之前,最好的下界是Omega(log* n)轮[Chung et al. 2014]。
{"title":"A lower bound for the distributed Lovász local lemma","authors":"S. Brandt, O. Fischer, J. Hirvonen, Barbara Keller, Tuomo Lempiäinen, J. Rybicki, J. Suomela, Jara Uitto","doi":"10.1145/2897518.2897570","DOIUrl":"https://doi.org/10.1145/2897518.2897570","url":null,"abstract":"We show that any randomised Monte Carlo distributed algorithm for the Lovász local lemma requires Omega(log log n) communication rounds, assuming that it finds a correct assignment with high probability. Our result holds even in the special case of d = O(1), where d is the maximum degree of the dependency graph. By prior work, there are distributed algorithms for the Lovász local lemma with a running time of O(log n) rounds in bounded-degree graphs, and the best lower bound before our work was Omega(log* n) rounds [Chung et al. 2014].","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
期刊
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1