首页 > 最新文献

Proceedings of the forty-eighth annual ACM symposium on Theory of Computing最新文献

英文 中文
Two-source dispersers for polylogarithmic entropy and improved ramsey graphs 多对数熵和改进拉姆齐图的双源分散器
Pub Date : 2015-06-14 DOI: 10.1145/2897518.2897530
Gil Cohen
In his influential 1947 paper that inaugurated the probabilistic method, Erdős proved the existence of 2logn-Ramsey graphs on n vertices. Matching Erdős’ result with a constructive proof is considered a central problem in combinatorics, that has gained a significant attention in the literature. The state of the art result was obtained in the celebrated paper by Barak, Rao, Shaltiel, and Wigderson who constructed a 22(loglogn)1−α-Ramsey graph, for some small universal constant α > 0. In this work, we significantly improve this result and construct 2(loglogn)c-Ramsey graphs, for some universal constant c. In the language of theoretical computer science, this resolves the problem of explicitly constructing dispersers for two n-bit sources with entropy (n). In fact, our disperser is a zero-error disperser that outputs a constant fraction of the entropy. Prior to this work, such dispersers could only support entropy Ω(n).
在他1947年发表的开创了概率方法的论文中,Erdős证明了n个顶点上的2log - ramsey图的存在性。匹配Erdős '的结果与建设性的证明被认为是一个中心问题,在组合学,已获得了显著的关注在文献。在Barak, Rao, Shaltiel和Wigderson的著名论文中,他们构造了一个22(loglogn)1−α- ramsey图,对于某个小的普遍常数α > 0,得到了最先进的结果。在这项工作中,我们显著改进了这一结果,并为一些通用常数c构造了2(loglogn)c- ramsey图。用理论计算机科学的语言来说,这解决了为两个具有熵(n)的n位源显式构造分散器的问题。事实上,我们的分散器是一个零误差分散器,输出熵的常数部分。在这项工作之前,这种分散剂只能支持熵Ω(n)。
{"title":"Two-source dispersers for polylogarithmic entropy and improved ramsey graphs","authors":"Gil Cohen","doi":"10.1145/2897518.2897530","DOIUrl":"https://doi.org/10.1145/2897518.2897530","url":null,"abstract":"In his influential 1947 paper that inaugurated the probabilistic method, Erdős proved the existence of 2logn-Ramsey graphs on n vertices. Matching Erdős’ result with a constructive proof is considered a central problem in combinatorics, that has gained a significant attention in the literature. The state of the art result was obtained in the celebrated paper by Barak, Rao, Shaltiel, and Wigderson who constructed a 22(loglogn)1−α-Ramsey graph, for some small universal constant α > 0. In this work, we significantly improve this result and construct 2(loglogn)c-Ramsey graphs, for some universal constant c. In the language of theoretical computer science, this resolves the problem of explicitly constructing dispersers for two n-bit sources with entropy (n). In fact, our disperser is a zero-error disperser that outputs a constant fraction of the entropy. Prior to this work, such dispersers could only support entropy Ω(n).","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116990956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Ramanujan coverings of graphs 图的拉马努金覆盖
Pub Date : 2015-06-08 DOI: 10.1145/2897518.2897574
Chris Hall, Doron Puder, W. Sawin
Let G be a finite connected graph, and let ρ be the spectral radius of its universal cover. For example, if G is k-regular then ρ=2√k−1. We show that for every r, there is an r-covering (a.k.a. an r-lift) of G where all the new eigenvalues are bounded from above by ρ. It follows that a bipartite Ramanujan graph has a Ramanujan r-covering for every r. This generalizes the r=2 case due to Marcus, Spielman and Srivastava (2013). Every r-covering of G corresponds to a labeling of the edges of G by elements of the symmetric group Sr. We generalize this notion to labeling the edges by elements of various groups and present a broader scenario where Ramanujan coverings are guaranteed to exist. In particular, this shows the existence of richer families of bipartite Ramanujan graphs than was known before. Inspired by Marcus-Spielman-Srivastava, a crucial component of our proof is the existence of interlacing families of polynomials for complex reflection groups. The core argument of this component is taken from Marcus-Spielman-Srivastava (2015). Another important ingredient of our proof is a new generalization of the matching polynomial of a graph. We define the r-th matching polynomial of G to be the average matching polynomial of all r-coverings of G. We show this polynomial shares many properties with the original matching polynomial. For example, it is real rooted with all its roots inside [−ρ,ρ].
设G是一个有限连通图,ρ是它的全称覆盖的谱半径。例如,如果G是k规则的,那么ρ=2√k−1。我们证明,对于每一个r,都有一个G的r覆盖(也就是r升力)其中所有的新特征值都以ρ为上界。由此可见,二分拉马努金图对每个r都有一个拉马努金r覆盖。这推广了Marcus, Spielman和Srivastava(2013)提出的r=2的情况。G的每一个r-覆盖都对应于G的边被对称群sr的元素标记。我们将这一概念推广到用不同群的元素标记边,并给出了一个保证存在拉马努金覆盖的更广泛的场景。特别地,这表明存在比以前已知的更丰富的二部拉马努金图族。受Marcus-Spielman-Srivastava的启发,我们证明的一个关键组成部分是复数反射群的交错多项式族的存在。这部分的核心论点取自Marcus-Spielman-Srivastava(2015)。我们证明的另一个重要组成部分是对图的匹配多项式的一个新的推广。我们将G的第r个匹配多项式定义为G的所有r覆盖的平均匹配多项式,并证明了该多项式与原匹配多项式具有许多相同的性质。例如,它是实根,所有的根都在[−ρ,ρ]内。
{"title":"Ramanujan coverings of graphs","authors":"Chris Hall, Doron Puder, W. Sawin","doi":"10.1145/2897518.2897574","DOIUrl":"https://doi.org/10.1145/2897518.2897574","url":null,"abstract":"Let G be a finite connected graph, and let ρ be the spectral radius of its universal cover. For example, if G is k-regular then ρ=2√k−1. We show that for every r, there is an r-covering (a.k.a. an r-lift) of G where all the new eigenvalues are bounded from above by ρ. It follows that a bipartite Ramanujan graph has a Ramanujan r-covering for every r. This generalizes the r=2 case due to Marcus, Spielman and Srivastava (2013). Every r-covering of G corresponds to a labeling of the edges of G by elements of the symmetric group Sr. We generalize this notion to labeling the edges by elements of various groups and present a broader scenario where Ramanujan coverings are guaranteed to exist. In particular, this shows the existence of richer families of bipartite Ramanujan graphs than was known before. Inspired by Marcus-Spielman-Srivastava, a crucial component of our proof is the existence of interlacing families of polynomials for complex reflection groups. The core argument of this component is taken from Marcus-Spielman-Srivastava (2015). Another important ingredient of our proof is a new generalization of the matching polynomial of a graph. We define the r-th matching polynomial of G to be the average matching polynomial of all r-coverings of G. We show this polynomial shares many properties with the original matching polynomial. For example, it is real rooted with all its roots inside [−ρ,ρ].","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122342450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Classical verification of quantum proofs 量子证明的经典验证
Pub Date : 2015-05-27 DOI: 10.1145/2897518.2897634
Zhengfeng Ji
We present a classical interactive protocol that verifies the validity of a quantum witness state for the local Hamiltonian problem. It follows from this protocol that approximating the non-local value of a multi-player one-round game to inverse polynomial precision is QMA-hard. Our work makes an interesting connection between the theory of QMA-completeness and Hamiltonian complexity on one hand and the study of non-local games and Bell inequalities on the other.
我们提出了一个经典的交互协议来验证局部哈密顿问题的量子见证态的有效性。从该协议可以看出,将多人一局博弈的非局部值逼近到逆多项式精度是qma困难的。我们的工作在qma完备性和哈密顿复杂度理论与非局部对策和贝尔不等式的研究之间建立了一个有趣的联系。
{"title":"Classical verification of quantum proofs","authors":"Zhengfeng Ji","doi":"10.1145/2897518.2897634","DOIUrl":"https://doi.org/10.1145/2897518.2897634","url":null,"abstract":"We present a classical interactive protocol that verifies the validity of a quantum witness state for the local Hamiltonian problem. It follows from this protocol that approximating the non-local value of a multi-player one-round game to inverse polynomial precision is QMA-hard. Our work makes an interesting connection between the theory of QMA-completeness and Hamiltonian complexity on one hand and the study of non-local games and Bell inequalities on the other.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124072380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Complexity theoretic limitations on learning halfspaces 学习半空间的复杂性理论限制
Pub Date : 2015-05-21 DOI: 10.1145/2897518.2897520
Amit Daniely
We study the problem of agnostically learning halfspaces which is defined by a fixed but unknown distribution D on Q^n X {-1,1}. We define Err_H(D) as the least error of a halfspace classifier for D. A learner who can access D has to return a hypothesis whose error is small compared to Err_H(D). Using the recently developed method of Daniely, Linial and Shalev-Shwartz we prove hardness of learning results assuming that random K-XOR formulas are hard to (strongly) refute. We show that no efficient learning algorithm has non-trivial worst-case performance even under the guarantees that Err_H(D) <= eta for arbitrarily small constant eta>0, and that D is supported in the Boolean cube. Namely, even under these favorable conditions, and for every c>0, it is hard to return a hypothesis with error <= 1/2-n^{-c}. In particular, no efficient algorithm can achieve a constant approximation ratio. Under a stronger version of the assumption (where K can be poly-logarithmic in n), we can take eta = 2^{-log^{1-nu}(n)} for arbitrarily small nu>0. These results substantially improve on previously known results, that only show hardness of exact learning.
研究由Q^n X{-1,1}上的一个固定但未知的分布D所定义的不可知论学习半空间问题。我们将Err_H(D)定义为D的半空间分类器的最小误差。能够访问D的学习器必须返回一个误差小于Err_H(D)的假设。使用Daniely, Linial和shalev - schwartz最近开发的方法,我们证明了学习结果的硬度,假设随机K-XOR公式难以(强烈)反驳。我们证明,即使保证Err_H(D)为0,并且在布尔立方体中支持D,也没有有效的学习算法具有非平凡的最坏情况性能。也就是说,即使在这些有利条件下,对于每c>0,也很难返回误差为0的假设。这些结果大大改善了之前已知的结果,这些结果只显示了精确学习的难度。
{"title":"Complexity theoretic limitations on learning halfspaces","authors":"Amit Daniely","doi":"10.1145/2897518.2897520","DOIUrl":"https://doi.org/10.1145/2897518.2897520","url":null,"abstract":"We study the problem of agnostically learning halfspaces which is defined by a fixed but unknown distribution D on Q^n X {-1,1}. We define Err_H(D) as the least error of a halfspace classifier for D. A learner who can access D has to return a hypothesis whose error is small compared to Err_H(D). Using the recently developed method of Daniely, Linial and Shalev-Shwartz we prove hardness of learning results assuming that random K-XOR formulas are hard to (strongly) refute. We show that no efficient learning algorithm has non-trivial worst-case performance even under the guarantees that Err_H(D) <= eta for arbitrarily small constant eta>0, and that D is supported in the Boolean cube. Namely, even under these favorable conditions, and for every c>0, it is hard to return a hypothesis with error <= 1/2-n^{-c}. In particular, no efficient algorithm can achieve a constant approximation ratio. Under a stronger version of the assumption (where K can be poly-logarithmic in n), we can take eta = 2^{-log^{1-nu}(n)} for arbitrarily small nu>0. These results substantially improve on previously known results, that only show hardness of exact learning.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134237645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 119
Non-malleable extractors and codes, with their many tampered extensions 不可延展性的提取器和代码,以及它们的许多被篡改的扩展
Pub Date : 2015-05-01 DOI: 10.1145/2897518.2897547
Eshan Chattopadhyay, Vipul Goyal, Xin Li
Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the context and study of tamper resilient cryptography. These are seeded non-malleable extractors, introduced by Dodis and Wichs; seedless non-malleable extractors, introduced by Cheraghchi and Guruswami; and non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs. Besides being interesting on their own, they also have important applications in cryptography, e.g, privacy amplification with an active adversary, explicit non-malleable codes etc, and often have unexpected connections to their non-tampered analogues. However, the known constructions are far behind their non-tampered counterparts. Indeed, the best known seeded non-malleable extractor requires min-entropy rate at least 0.49; while explicit constructions of non-malleable two-source extractors were not known even if both sources have full min-entropy, and was left as an open problem by Cheraghchi and Guruswami. In this paper we make progress towards solving the above problems and other related generalizations. Our contributions are as follows. (1) We construct an explicit seeded non-malleable extractor for polylogarithmic min-entropy. This dramatically improves all previous results and gives a simpler 2-round privacy amplification protocol with optimal entropy loss, matching the best known result. In fact, we construct more general seeded non-malleable extractors (that can handle multiple adversaries) which were used in the recent construction of explicit two-source extractors for polylogarithmic min-entropy. (2) We construct the first explicit non-malleable two-source extractor for almost full min-entropy thus resolving the open question posed by Cheraghchi and Guruswami. (3) We motivate and initiate the study of two natural generalizations of seedless non-malleable extractors and non-malleable codes, where the sources or the codeword may be tampered many times. By using the connection found by Cheraghchi and Guruswami and providing efficient sampling algorithms, we obtain the first explicit non-malleable codes with tampering degree t, with near optimal rate and error. We call these stronger notions one-many and many-manynon-malleable codes. This provides a stronger information theoretic analogue of a primitive known as continuous non-malleable codes. Our basic technique used in all of our constructions can be seen as inspired, in part, by the techniques previously used to construct cryptographic non-malleable commitments.
随机抽取器和纠错码是计算机科学的基本研究对象。最近,在抗篡改密码学的背景和研究中,对这些对象进行了一些自然的推广。这些是由Dodis和Wichs引入的种子非延展性提取器;Cheraghchi和Guruswami介绍的无籽非延展性提取器;以及由Dziembowski、Pietrzak和Wichs引入的非延展性代码。除了自己有趣的,他们也在密码学有着重要的应用,例如,隐私放大与一个活跃的对手,明确non-malleable代码等,和经常有意想不到的连接non-tampered类似物。然而,已知的结构远远落后于未篡改的结构。事实上,最著名的种子非延展性提取器要求最小熵率至少为0.49;而非可延展双源提取器的显式结构则不知道,即使两个源都有完全的最小熵,并且被Cheraghchi和Guruswami作为一个开放的问题。在本文中,我们对解决上述问题取得进展和其他相关概括。我们的贡献如下。(1)构造了多对数最小熵的显式种子非延展性提取器。这极大地改进了之前的所有结果,并给出了一个更简单的2轮隐私放大协议,具有最佳熵损失,与已知的最佳结果相匹配。事实上,我们构建了更通用的种子非延展性提取器(可以处理多个对手),这些提取器在最近的多对数最小熵显式双源提取器的构建中使用。(2)我们构造了第一个显式的几乎全最小熵的非可延展双源提取器,从而解决了Cheraghchi和Guruswami提出的开放性问题。(3)我们激发并发起了无籽不可延展性提取器和不可延展性代码的两种自然推广研究,其中源或码字可能被多次篡改。通过使用连接发现Cheraghchi Guruswami和提供有效的抽样算法,我们获得第一个明确non-malleable代码篡改度t,与附近的最优率和错误。我们称这些更强的概念为一多和多多不可延展性代码。这提供了一个强大的信息理论的模拟原始称为连续non-malleable代码。我们在所有结构中使用的基本技术可以被看作是受到先前用于构造加密不可延展性承诺的技术的部分启发。
{"title":"Non-malleable extractors and codes, with their many tampered extensions","authors":"Eshan Chattopadhyay, Vipul Goyal, Xin Li","doi":"10.1145/2897518.2897547","DOIUrl":"https://doi.org/10.1145/2897518.2897547","url":null,"abstract":"Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the context and study of tamper resilient cryptography. These are seeded non-malleable extractors, introduced by Dodis and Wichs; seedless non-malleable extractors, introduced by Cheraghchi and Guruswami; and non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs. Besides being interesting on their own, they also have important applications in cryptography, e.g, privacy amplification with an active adversary, explicit non-malleable codes etc, and often have unexpected connections to their non-tampered analogues. However, the known constructions are far behind their non-tampered counterparts. Indeed, the best known seeded non-malleable extractor requires min-entropy rate at least 0.49; while explicit constructions of non-malleable two-source extractors were not known even if both sources have full min-entropy, and was left as an open problem by Cheraghchi and Guruswami. In this paper we make progress towards solving the above problems and other related generalizations. Our contributions are as follows. (1) We construct an explicit seeded non-malleable extractor for polylogarithmic min-entropy. This dramatically improves all previous results and gives a simpler 2-round privacy amplification protocol with optimal entropy loss, matching the best known result. In fact, we construct more general seeded non-malleable extractors (that can handle multiple adversaries) which were used in the recent construction of explicit two-source extractors for polylogarithmic min-entropy. (2) We construct the first explicit non-malleable two-source extractor for almost full min-entropy thus resolving the open question posed by Cheraghchi and Guruswami. (3) We motivate and initiate the study of two natural generalizations of seedless non-malleable extractors and non-malleable codes, where the sources or the codeword may be tampered many times. By using the connection found by Cheraghchi and Guruswami and providing efficient sampling algorithms, we obtain the first explicit non-malleable codes with tampering degree t, with near optimal rate and error. We call these stronger notions one-many and many-manynon-malleable codes. This provides a stronger information theoretic analogue of a primitive known as continuous non-malleable codes. Our basic technique used in all of our constructions can be seen as inspired, in part, by the techniques previously used to construct cryptographic non-malleable commitments.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128772009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
A deterministic almost-tight distributed algorithm for approximating single-source shortest paths 近似单源最短路径的确定性近紧分布算法
Pub Date : 2015-04-27 DOI: 10.1145/2897518.2897638
M. Henzinger, Sebastian Krinninger, Danupon Nanongkai
We present a deterministic (1+o(1))-approximation O(n1/2+o(1)+D1+o(1))-time algorithm for solving the single-source shortest paths problem on distributed weighted networks (the CONGEST model); here n is the number of nodes in the network and D is its (hop) diameter. This is the first non-trivial deterministic algorithm for this problem. It also improves (i) the running time of the randomized (1+o(1))-approximation Õ(n1/2D1/4+D)-time algorithm of Nanongkai [STOC 2014] by a factor of as large as n1/8, and (ii) the O(є−1logє−1)-approximation factor of Lenzen and Patt-Shamir’s Õ(n1/2+є+D)-time algorithm [STOC 2013] within the same running time. Our running time matches the known time lower bound of Ω(n1/2/logn + D) [Das Sarma et al. STOC 2011] modulo some lower-order terms, thus essentially settling the status of this problem which was raised at least a decade ago [Elkin SIGACT News 2004]. It also implies a (2+o(1))-approximation O(n1/2+o(1)+D1+o(1))-time algorithm for approximating a network’s weighted diameter which almost matches the lower bound by Holzer et al. [PODC 2012]. In achieving this result, we develop two techniques which might be of independent interest and useful in other settings: (i) a deterministic process that replaces the “hitting set argument” commonly used for shortest paths computation in various settings, and (ii) a simple, deterministic, construction of an (no(1), o(1))-hop set of size O(n1+o(1)). We combine these techniques with many distributed algorithmic techniques, some of which from problems that are not directly related to shortest paths, e.g. ruling sets [Goldberg et al. STOC 1987], source detection [Lenzen, Peleg PODC 2013], and partial distance estimation [Lenzen, Patt-Shamir PODC 2015]. Our hop set construction also leads to single-source shortest paths algorithms in two other settings: (i) a (1+o(1))-approximation O(no(1))-time algorithm on congested cliques, and (ii) a (1+o(1))-approximation O(no(1)logW)-pass O(n1+o(1)logW)-space streaming algorithm, when edge weights are in {1, 2, …, W}. The first result answers an open problem in [Nanongkai, STOC 2014]. The second result partially answers an open problem raised by McGregor in 2006 [sublinear.info, Problem 14].
提出了一种确定性(1+o(1))-近似o(n1/2+o(1)+D1+o(1)))时间算法,用于求解分布式加权网络(CONGEST模型)上的单源最短路径问题;这里n是网络中的节点数,D是它的跳(hop)直径。这是该问题的第一个非平凡确定性算法。在相同的运行时间内,将Nanongkai [STOC 2014]的随机化(1+o(1))-近似Õ(n1/2D1/4+D)时间算法的运行时间提高了n1/8倍,将Lenzen和patti - shamir的Õ(n1/2+ n1 +D)时间算法[STOC 2013]的运行时间提高了o(n1 - 1logtu - 1)-近似因子。我们的运行时间匹配Ω(n1/2/logn + D)的已知时间下界[Das Sarma等。STOC 2011]对一些低阶项进行模,从而基本上解决了至少十年前提出的这个问题的现状[Elkin SIGACT News 2004]。它还暗示了一种(2+o(1))-近似o(n1/2+o(1)+D1+o(1)))-时间算法来逼近网络的加权直径,该算法几乎与Holzer等人[PODC 2012]的下界相匹配。为了实现这一结果,我们开发了两种可能在其他设置中独立感兴趣且有用的技术:(i)替代在各种设置中通常用于最短路径计算的“命中集参数”的确定性过程,以及(ii)大小为o(n1+o(1))的(no(1), o(1))-hop集的简单,确定性构造。我们将这些技术与许多分布式算法技术相结合,其中一些技术来自与最短路径不直接相关的问题,例如规则集[Goldberg等人]。STOC 1987]、源检测[Lenzen, Peleg PODC 2013]和部分距离估计[Lenzen, pat - shamir PODC 2015]。我们的跳集构造还导致了另外两种设置下的单源最短路径算法:(i)在拥塞团上的a (1+o(1))-近似o(no(1))时间算法,以及(ii) a (1+o(1))-近似o(no(1)logW)-传递o(n1+o(1)logW)-空间流算法,当边权重为{1,2,…,W}时。第一个结果回答了[Nanongkai, STOC 2014]中的一个开放问题。第二个结果部分回答了McGregor在2006年提出的一个开放性问题[sublinear.info,问题14]。
{"title":"A deterministic almost-tight distributed algorithm for approximating single-source shortest paths","authors":"M. Henzinger, Sebastian Krinninger, Danupon Nanongkai","doi":"10.1145/2897518.2897638","DOIUrl":"https://doi.org/10.1145/2897518.2897638","url":null,"abstract":"We present a deterministic (1+o(1))-approximation O(n1/2+o(1)+D1+o(1))-time algorithm for solving the single-source shortest paths problem on distributed weighted networks (the CONGEST model); here n is the number of nodes in the network and D is its (hop) diameter. This is the first non-trivial deterministic algorithm for this problem. It also improves (i) the running time of the randomized (1+o(1))-approximation Õ(n1/2D1/4+D)-time algorithm of Nanongkai [STOC 2014] by a factor of as large as n1/8, and (ii) the O(є−1logє−1)-approximation factor of Lenzen and Patt-Shamir’s Õ(n1/2+є+D)-time algorithm [STOC 2013] within the same running time. Our running time matches the known time lower bound of Ω(n1/2/logn + D) [Das Sarma et al. STOC 2011] modulo some lower-order terms, thus essentially settling the status of this problem which was raised at least a decade ago [Elkin SIGACT News 2004]. It also implies a (2+o(1))-approximation O(n1/2+o(1)+D1+o(1))-time algorithm for approximating a network’s weighted diameter which almost matches the lower bound by Holzer et al. [PODC 2012]. In achieving this result, we develop two techniques which might be of independent interest and useful in other settings: (i) a deterministic process that replaces the “hitting set argument” commonly used for shortest paths computation in various settings, and (ii) a simple, deterministic, construction of an (no(1), o(1))-hop set of size O(n1+o(1)). We combine these techniques with many distributed algorithmic techniques, some of which from problems that are not directly related to shortest paths, e.g. ruling sets [Goldberg et al. STOC 1987], source detection [Lenzen, Peleg PODC 2013], and partial distance estimation [Lenzen, Patt-Shamir PODC 2015]. Our hop set construction also leads to single-source shortest paths algorithms in two other settings: (i) a (1+o(1))-approximation O(no(1))-time algorithm on congested cliques, and (ii) a (1+o(1))-approximation O(no(1)logW)-pass O(n1+o(1)logW)-space streaming algorithm, when edge weights are in {1, 2, …, W}. The first result answers an open problem in [Nanongkai, STOC 2014]. The second result partially answers an open problem raised by McGregor in 2006 [sublinear.info, Problem 14].","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134041249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 106
Optimal principal component analysis in distributed and streaming models 分布式和流模型的最优主成分分析
Pub Date : 2015-04-25 DOI: 10.1145/2897518.2897646
Christos Boutsidis, David P. Woodruff, Peilin Zhong
This paper studies the Principal Component Analysis (PCA) problem in the distributed and streaming models of computation. Given a matrix A ∈ Rm×n, a rank parameter k
本文研究了分布式和流计算模型中的主成分分析问题。给定矩阵a∈Rm×n,秩参数k<秩(a),精度参数0<ε<1,我们想要输出一个m×k正交矩阵U,其中|| a - uuta ||2F≤(1+ε)|| a -Ak||2F,其中Ak∈Rm×n是a的最佳秩-k逼近。在Kannan et al. (COLT 2014)的任意分区分布模型中,s台机器中的每台机器都保存一个矩阵Ai和a =ΣAi。Kannan等人实现了O(skm/ε)+poly(sk/ε)字(of O(log(nm))位)的通信。我们得到了O(skm)+poly(sk/ε)字的改进界,并给出了一个最优(直到低阶项)Ω(skm)下界。这解决了文献中的一个悬而未决的问题。已知需要poly(ε-1)依赖性,但我们将这种依赖性从m. 2中分离出来。在更具体的分布式模型中,每个服务器接收a的列子集,当a在每列中为φ-稀疏时,我们绕过上述下界。这里我们得到了一个O(skφ/ε)+poly(sk/ε)字协议。我们的通信是独立于矩阵维数的,并且实现了保证每个服务器除了输出U之外,还输出包含U的a的O(k/ε)列的子集(即,我们首次解决了分布式列子集选择问题)。此外,我们还展示了一个匹配的Ω(skφ/ε)下界,用于分布式列子集的选择。当A总体上是稀疏的,但不是每一列都是稀疏的,实现我们的通信边界是不可能的。3.在矩阵A的列每次到达一列的流计算模型中,Liberty (KDD, 2013)算法与Ghashami和Phillips (SODA, 2014)的改进分析实现了O(km/ε)。“实数”空间复杂度。我们改进了这个结果,因为我们的一遍流PCA算法实现了O(km/ε)+poly(k/ε)字空间上界。这几乎与wooddruff已知的Ω(km/ε)钻头下界相匹配(NIPS, 2014)。我们证明了在A的列上经过两次可以实现O(km)+poly(k/ε)字空间上界;Woodruff (NIPS, 2014)的另一个下界表明,这对于任何恒定次数的通过(直到poly(k/ε)项以及字与位之间的区别)都是最佳的。4. 最后,在turnstile流中,我们每次以任意顺序接收A的一个条目,我们用O((m+n)kε-1)个词的空间描述了一个算法。这改进了Clarkson和Woodruff (STOC 2009)的O((m+n)ε-2)kε-2)上界,并匹配了他们的Ω((m+n)kε-1)下界。值得注意的是,我们的结果不依赖于条件数或A的任何奇异值间隙。
{"title":"Optimal principal component analysis in distributed and streaming models","authors":"Christos Boutsidis, David P. Woodruff, Peilin Zhong","doi":"10.1145/2897518.2897646","DOIUrl":"https://doi.org/10.1145/2897518.2897646","url":null,"abstract":"This paper studies the Principal Component Analysis (PCA) problem in the distributed and streaming models of computation. Given a matrix A ∈ Rm×n, a rank parameter k<rank(A), and an accuracy parameter 0<ε<1, we want to output an m×k orthonormal matrix U for which ||A-UUTA||2F≤(1+ε)||A-Ak||2F where Ak∈Rm×n is the best rank-k approximation to A. Our contributions are summarized as follows: 1. In the arbitrary partition distributed model of Kannan et al. (COLT 2014), each of s machines holds a matrix Ai and A=ΣAi. Each machine should output U. Kannan et al. achieve O(skm/ε)+poly(sk/ε) words (of O(log(nm)) bits) communication. We obtain the improved bound of O(skm)+poly(sk/ε) words, and show an optimal (up to low order terms) Ω(skm) lower bound. This resolves an open question in the literature. A poly(ε-1) dependence is known to be required, but we separate this dependence from m. 2. In a more specific distributed model where each server receives a subset of columns of A, we bypass the above lower bound when A is φ-sparse in each column. Here we obtain an O(skφ/ε)+poly(sk/ε) word protocol. Our communication is independent of the matrix dimensions, and achieves the guarantee that each server, in addition to outputting U, outputs a subset of O(k/ε) columns of A containing a U in its span (that is, for the first time, we solve distributed column subset selection). Additionally, we show a matching Ω(skφ/ε) lower bound for distributed column subset selection. Achieving our communication bound when A is sparse in general but not sparse in each column, is impossible. 3. In the streaming model of computation, in which the columns of the matrix A arrive one at a time, an algorithm of Liberty (KDD, 2013) with an improved analysis by Ghashami and Phillips (SODA, 2014) achieves O(km/ε) \"real numbers\" space complexity. We improve this result, since our one-pass streaming PCA algorithm achieves an O(km/ε)+poly(k/ε) word space upper bound. This almost matches a known Ω(km/ε) bit lower bound of Woodruff (NIPS, 2014). We show that with two passes over the columns of A one can achieve an O(km)+poly(k/ε) word space upper bound; another lower bound of Woodruff (NIPS, 2014) shows that this is optimal for any constant number of passes (up to the poly(k/ε) term and the distinction between words versus bits). 4. Finally, in turnstile streams, in which we receive entries of A one at a time in an arbitrary order, we describe an algorithm with O((m+n)kε-1) words of space. This improves the O((m+n)ε-2)kε-2) upper bound of Clarkson and Woodruff (STOC 2009), and matches their Ω((m+n)kε-1) word lower bound. Notably, our results do not depend on the condition number or any singular value gaps of A.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125846163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
Semidefinite programs on sparse random graphs and their application to community detection 稀疏随机图上的半定程序及其在社区检测中的应用
Pub Date : 2015-04-22 DOI: 10.1145/2897518.2897548
A. Montanari, S. Sen
Denote by A the adjacency matrix of an Erdos-Renyi graph with bounded average degree. We consider the problem of maximizing over the set of positive semidefinite matrices X with diagonal entries X_ii=1. We prove that for large (bounded) average degree d, the value of this semidefinite program (SDP) is --with high probability-- 2n*sqrt(d) + n, o(sqrt(d))+o(n). For a random regular graph of degree d, we prove that the SDP value is 2n*sqrt(d-1)+o(n), matching a spectral upper bound. Informally, Erdos-Renyi graphs appear to behave similarly to random regular graphs for semidefinite programming. We next consider the sparse, two-groups, symmetric community detection problem (also known as planted partition). We establish that SDP achieves the information-theoretically optimal detection threshold for large (bounded) degree. Namely, under this model, the vertex set is partitioned into subsets of size n/2, with edge probability a/n (within group) and b/n (across). We prove that SDP detects the partition with high probability provided (a-b)^2/(4d)> 1+o_d(1), with d= (a+b)/2. By comparison, the information theoretic threshold for detecting the hidden partition is (a-b)^2/(4d)> 1: SDP is nearly optimal for large bounded average degree. Our proof is based on tools from different research areas: (i) A new 'higher-rank' Grothendieck inequality for symmetric matrices; (ii) An interpolation method inspired from statistical physics; (iii) An analysis of the eigenvectors of deformed Gaussian random matrices.
用A表示平均度有界的Erdos-Renyi图的邻接矩阵。考虑对角线项X_ii=1的正半定矩阵集合X上的极值问题。我们证明了对于大的(有界的)平均度d,这个半定规划(SDP)的值有高概率为2n*sqrt(d) + n, o(sqrt(d))+o(n)。对于d次随机正则图,我们证明了SDP值为2n*sqrt(d-1)+o(n),匹配一个谱上界。非正式地,Erdos-Renyi图的行为类似于半定规划的随机正则图。我们接下来考虑稀疏、两组、对称社区检测问题(也称为种植分区)。建立了SDP在大(有界)度下实现了信息论最优检测阈值。即,在该模型下,顶点集被划分为大小为n/2的子集,边缘概率为a/n(组内)和b/n(跨)。证明了当(a-b)^2/(4d)> 1+o_d(1),且d= (a+b)/2时,SDP检测分区的概率很高。通过比较,发现隐藏分区的信息论阈值为(a-b)^2/(4d)> 1,对于有界平均度较大的情况,SDP近似为最优。我们的证明是基于不同研究领域的工具:(i)对称矩阵的一个新的“高秩”Grothendieck不等式;受统计物理学启发的插值方法;(iii)变形高斯随机矩阵的特征向量分析。
{"title":"Semidefinite programs on sparse random graphs and their application to community detection","authors":"A. Montanari, S. Sen","doi":"10.1145/2897518.2897548","DOIUrl":"https://doi.org/10.1145/2897518.2897548","url":null,"abstract":"Denote by A the adjacency matrix of an Erdos-Renyi graph with bounded average degree. We consider the problem of maximizing over the set of positive semidefinite matrices X with diagonal entries X_ii=1. We prove that for large (bounded) average degree d, the value of this semidefinite program (SDP) is --with high probability-- 2n*sqrt(d) + n, o(sqrt(d))+o(n). For a random regular graph of degree d, we prove that the SDP value is 2n*sqrt(d-1)+o(n), matching a spectral upper bound. Informally, Erdos-Renyi graphs appear to behave similarly to random regular graphs for semidefinite programming. We next consider the sparse, two-groups, symmetric community detection problem (also known as planted partition). We establish that SDP achieves the information-theoretically optimal detection threshold for large (bounded) degree. Namely, under this model, the vertex set is partitioned into subsets of size n/2, with edge probability a/n (within group) and b/n (across). We prove that SDP detects the partition with high probability provided (a-b)^2/(4d)> 1+o_d(1), with d= (a+b)/2. By comparison, the information theoretic threshold for detecting the hidden partition is (a-b)^2/(4d)> 1: SDP is nearly optimal for large bounded average degree. Our proof is based on tools from different research areas: (i) A new 'higher-rank' Grothendieck inequality for symmetric matrices; (ii) An interpolation method inspired from statistical physics; (iii) An analysis of the eigenvectors of deformed Gaussian random matrices.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134532879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 134
High-rate locally-correctable and locally-testable codes with sub-polynomial query complexity 具有次多项式查询复杂度的高速率局部可纠错和局部可测试代码
Pub Date : 2015-04-21 DOI: 10.1145/2897518.2897523
Swastik Kopparty, Or Meir, Noga Ron-Zewi, Shubhangi Saraf
In this work, we construct the first locally-correctable codes (LCCs), and locally-testable codes (LTCs) with constant rate, constant relative distance, and sub-polynomial query complexity. Specifically, we show that there exist LCCs and LTCs with block length n, constant rate (which can even be taken arbitrarily close to 1) and constant relative distance, whose query complexity is exp(Õ(√logn)) (for LCCs) and (logn)O(loglogn) (for LTCs). Previously such codes were known to exist only with Ω(nβ) query complexity (for constant β>0). In addition to having small query complexity, our codes also achieve better trade-offs between the rate and the relative distance than were previously known to be achievable by LCCs or LTCs. Specifically, over large (but constant size) alphabet, our codes approach the Singleton bound, that is, they have almost the best-possible relationship between their rate and distance. This has the surprising consequence that asking for a large-alphabet error-correcting code to further be an LCC or LTC with sub-polynomial query complexity does not require any sacrifice in terms of rate and distance! Over the binary alphabet, our codes meet the Zyablov bound. Such trade-offs between the rate and the relative distance were previously not known for any o(n) query complexity. Our results on LCCs also immediately give locally-decodable codes (LDCs) with the same parameters. Our codes are based on a technique of Alon, Edmonds and Luby. We observe that this technique can be used as a general distance-amplification method, and show that it interacts well with local correctors and testers. We obtain our main results by applying this method to suitably constructed LCCs and LTCs in the non-standard regime of sub-constant relative distance.
在这项工作中,我们构造了第一个具有恒定速率、恒定相对距离和次多项式查询复杂度的局部可校正码(lcc)和局部可测试码(LTCs)。具体来说,我们证明了存在块长度为n、恒定速率(甚至可以任意接近1)和恒定相对距离的lcc和ltc,其查询复杂度为exp(Õ(√logn))(对于lcc)和(logn)O(loglog)(对于ltc)。以前已知这样的代码只存在Ω(nβ)查询复杂度(对于常数β>0)。除了具有较小的查询复杂性之外,我们的代码还在速率和相对距离之间实现了比以前已知的lcc或ltc所能实现的更好的权衡。具体来说,在较大(但大小不变)的字母上,我们的代码接近单例界,也就是说,它们的速率和距离之间几乎具有最佳可能的关系。这产生了一个令人惊讶的结果:要求一个大字母纠错码进一步成为具有次多项式查询复杂性的LCC或LTC,而不需要在速率和距离方面做出任何牺牲!在二进制字母表中,我们的代码满足Zyablov界。对于任何o(n)查询复杂度,这种速率和相对距离之间的权衡以前是未知的。我们关于lcc的结果也立即给出具有相同参数的本地可解码代码(ldc)。我们的代码是基于阿隆,埃德蒙兹和露比的技术。我们观察到这种技术可以作为一种通用的距离放大方法,并表明它与局部校正器和测试仪具有良好的相互作用。我们将该方法应用于亚常数相对距离的非标准区域中适当构造的lcc和LTCs,得到了我们的主要结果。
{"title":"High-rate locally-correctable and locally-testable codes with sub-polynomial query complexity","authors":"Swastik Kopparty, Or Meir, Noga Ron-Zewi, Shubhangi Saraf","doi":"10.1145/2897518.2897523","DOIUrl":"https://doi.org/10.1145/2897518.2897523","url":null,"abstract":"In this work, we construct the first locally-correctable codes (LCCs), and locally-testable codes (LTCs) with constant rate, constant relative distance, and sub-polynomial query complexity. Specifically, we show that there exist LCCs and LTCs with block length n, constant rate (which can even be taken arbitrarily close to 1) and constant relative distance, whose query complexity is exp(Õ(√logn)) (for LCCs) and (logn)O(loglogn) (for LTCs). Previously such codes were known to exist only with Ω(nβ) query complexity (for constant β>0). In addition to having small query complexity, our codes also achieve better trade-offs between the rate and the relative distance than were previously known to be achievable by LCCs or LTCs. Specifically, over large (but constant size) alphabet, our codes approach the Singleton bound, that is, they have almost the best-possible relationship between their rate and distance. This has the surprising consequence that asking for a large-alphabet error-correcting code to further be an LCC or LTC with sub-polynomial query complexity does not require any sacrifice in terms of rate and distance! Over the binary alphabet, our codes meet the Zyablov bound. Such trade-offs between the rate and the relative distance were previously not known for any o(n) query complexity. Our results on LCCs also immediately give locally-decodable codes (LDCs) with the same parameters. Our codes are based on a technique of Alon, Edmonds and Luby. We observe that this technique can be used as a general distance-amplification method, and show that it interacts well with local correctors and testers. We obtain our main results by applying this method to suitably constructed LCCs and LTCs in the non-standard regime of sub-constant relative distance.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126494466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
The computational power of optimization in online learning 优化在线学习的计算能力
Pub Date : 2015-04-08 DOI: 10.1145/2897518.2897536
Elad Hazan, Tomer Koren
We consider the fundamental problem of prediction with expert advice where the experts are “optimizable”: there is a black-box optimization oracle that can be used to compute, in constant time, the leading expert in retrospect at any point in time. In this setting, we give a novel online algorithm that attains vanishing regret with respect to N experts in total O(√N) computation time. We also give a lower bound showing that this running time cannot be improved (up to log factors) in the oracle model, thereby exhibiting a quadratic speedup as compared to the standard, oracle-free setting where the required time for vanishing regret is Θ(N). These results demonstrate an exponential gap between the power of optimization in online learning and its power in statistical learning: in the latter, an optimization oracle—i.e., an efficient empirical risk minimizer—allows to learn a finite hypothesis class of size N in time O(logN). We also study the implications of our results to learning in repeated zero-sum games, in a setting where the players have access to oracles that compute, in constant time, their best-response to any mixed strategy of their opponent. We show that the runtime required for approximating the minimax value of the game in this setting is Θ(√N), yielding again a quadratic improvement upon the oracle-free setting, where Θ(N) is known to be tight.
我们考虑专家建议预测的基本问题,其中专家是“可优化的”:有一个黑盒优化oracle,可用于在恒定时间内计算在任何时间点回顾的领先专家。在这种情况下,我们给出了一种新的在线算法,该算法在总共O(√N)的计算时间内实现了N个专家的遗憾消失。我们还给出了一个下界,表明这个运行时间在oracle模型中不能改进(最多log因子),因此与标准的、无oracle的设置相比,显示出二次加速,其中消除遗憾所需的时间为Θ(N)。这些结果表明,在线学习中的优化能力与统计学习中的优化能力之间存在指数差距:在统计学习中,一个优化预言机——即。,一个有效的经验风险最小化器,允许在时间O(logN)内学习大小为N的有限假设类。我们还研究了在重复的零和游戏中我们的结果对学习的影响,在这个游戏中,玩家可以使用预言机,在恒定的时间内计算出他们对对手的任何混合策略的最佳反应。我们表明,在这种设置中,近似游戏的最小最大值所需的运行时间为Θ(√N),在无oracle的设置上再次得到二次改进,其中Θ(N)已知是紧的。
{"title":"The computational power of optimization in online learning","authors":"Elad Hazan, Tomer Koren","doi":"10.1145/2897518.2897536","DOIUrl":"https://doi.org/10.1145/2897518.2897536","url":null,"abstract":"We consider the fundamental problem of prediction with expert advice where the experts are “optimizable”: there is a black-box optimization oracle that can be used to compute, in constant time, the leading expert in retrospect at any point in time. In this setting, we give a novel online algorithm that attains vanishing regret with respect to N experts in total O(√N) computation time. We also give a lower bound showing that this running time cannot be improved (up to log factors) in the oracle model, thereby exhibiting a quadratic speedup as compared to the standard, oracle-free setting where the required time for vanishing regret is Θ(N). These results demonstrate an exponential gap between the power of optimization in online learning and its power in statistical learning: in the latter, an optimization oracle—i.e., an efficient empirical risk minimizer—allows to learn a finite hypothesis class of size N in time O(logN). We also study the implications of our results to learning in repeated zero-sum games, in a setting where the players have access to oracles that compute, in constant time, their best-response to any mixed strategy of their opponent. We show that the runtime required for approximating the minimax value of the game in this setting is Θ(√N), yielding again a quadratic improvement upon the oracle-free setting, where Θ(N) is known to be tight.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121509853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
期刊
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1