To refer to this page use:
http://arks.princeton.edu/ark:/88435/pr18d7x
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dvir, Zeev | - |
dc.contributor.author | Rao, A | - |
dc.contributor.author | Wigderson, A | - |
dc.contributor.author | Yehudayoff, A | - |
dc.date.accessioned | 2018-07-20T15:10:31Z | - |
dc.date.available | 2018-07-20T15:10:31Z | - |
dc.date.issued | 2012-01-08 | en_US |
dc.identifier.citation | Dvir, Z, Rao, A, Wigderson, A, Yehudayoff, A. (2012). Restriction access. 19 - 33. doi:10.1145/2090236.2090239 | en_US |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/pr18d7x | - |
dc.description.abstract | We introduce a notion of non-black-box access to computational devices (such as circuits, formulas, decision trees, and so forth) that we call restriction access. Restrictions are partial assignments to input variables. Each restriction simplifies the device, and yields a new device for the restricted function on the unassigned variables. On one extreme, full restrictions (assigning all variables) correspond to evaluating the device on a complete input, yielding the result of the computation on that input, which is the same as standard black-box access. On the other extreme, empty restrictions (assigning no variables) yield a full description of the original device. We explore the grey-scale of possibilities in the middle. Focusing on learning theory, we show that restriction access provides a setting in which one can obtain positive results for problems that have resisted attack in the black-box access model. We introduce a PAC-learning version of restriction access, and show that one can efficiently learn both decision trees and DNF formulas in this model. These two classes are not known to be learnable in the PAC model with black-box access. Our DNF learning algorithm is obtained by a reduction to a general learning problem we call population recovery, in which random samples from an unknown distribution become available only after a random part of each is obliterated. Specifically, assume that every member of an unknown population is described by a vector of values. The algorithm has access to random samples, each of which is a random member of the population, whose values are given only on a random subset of the attributes. Analyzing our efficient algorithm to fully recover the unknown population calls for understanding another basic problem of independent interest: "robust local inversion" of matrices. The population recovery algorithm and construction of robust local inverses for some families of matrices are the main technical contributions of the paper. We also discuss other possible variants of restriction access, in which the values to restricted variables, as well as the subset of free (unassigned) variables, are generated deterministically or randomly, in friendly or adversarial fashions. We discuss how these models may naturally suit situations in computational learning, computational biology, automated proofs, cryptography and complexity theory. | en_US |
dc.format.extent | 19 - 33 | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartof | 3rd Conference on Innovations in Theoretical Computer Science, ITCS 2012 | en_US |
dc.rights | Author's manuscript | en_US |
dc.title | Restriction access | en_US |
dc.type | Conference Article | en_US |
dc.identifier.doi | doi:10.1145/2090236.2090239 | - |
dc.date.eissued | 2012 | en_US |
pu.type.symplectic | http://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceeding | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Restriction access.pdf | 388.87 kB | Adobe PDF | View/Download |
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.