首页> 外文学位 >New perspectives on the complexity of computational learning, and other problems in theoretical computer science.
【24h】

New perspectives on the complexity of computational learning, and other problems in theoretical computer science.

机译:关于计算学习的复杂性以及理论计算机科学中其他问题的新观点。

获取原文
获取原文并翻译 | 示例

摘要

In this thesis we present the following results.;1. Learning theory, and in particular PAC learning, was introduced by Valiant [CACM 1984] and has since become a major area of research in theoretical and applied computer science. One natural question that was posed at the very inception of the field is whether there are classes of functions that are hard to learn.;PAC learning is hard under widely held conjectures such as the existence of one-way functions, and on the other hand it is known that if PAC learning is hard then P ≠ NP. We further study sufficient and necessary conditions for PAC learning to be hard, and we prove that: (1) ZK ≠ BPP implies that PAC learning is hard. (2) It is unlikely using standard techniques that one can prove that PAC learning is hard implies that ZK ≠ BPP. (3) It is unlikely using standard techniques that one can prove that P ≠ NP implies that ZK ≠ BPP.;Here, "standard techniques" refers to various classes of efficient reductions. Together, these results imply that the hardness of PAC learning lies between the non-triviality of ZK on the one hand and the hardness of NP on the other hand. Furthermore, the hardness of PAC learning lies "strictly" between the two, in the sense that most standard techniques cannot prove equivalence with either ZK ≠ BPP or NP ≠ P.;In proving these results, we show new connections between PAC learning and auxiliary-input one-way functions, which were defined by Ostrovsky and Wigderson [ISTCS 1993] to better understand ZK. We also define new problems related to PAC learning that we believe of are independent interest, and may be useful in future studies of the complexity of PAC learning.;2. A secure failure-localization (FL) protocol allows a sender to localize faulty links on a single path through a network to a receiver, even when intermediate nodes on the path behave adversarially. Such protocols were proposed as tools that enable Internet service providers to select high-performance paths through the Internet, or to enforce contractual obligations. We give the first formal definitions of security for FL protocols and prove that for such protocols, security requires each intermediate node on the path to have some shared secret information ( e.g. keys), and that every black-box construction of a secure FL protocol from a random oracle requires each intermediate node to invoke the random oracle. This suggests that achieving this kind of security is unrealistic as intermediate nodes have little incentive to participate in the real world.;3. Ahlswede and Winter [IEEE Trans. Inf. Th. 2002] introduced a Chernoff bound for matrix-valued random variables, which is a non-trivial generalization of the usual Chernoff bound for real-valued random variables. We present an efficient derandomization of their bound using the method of pessimistic estimators (see Raghavan [JCSS 1988]). As a consequence, we derandomize a construction of Alon and Roichman [RSA 1994] to efficiently construct an expanding Cayley graph of logarithmic degree on any (possibly non-abelian) group. This gives an optimal solution to the homomorphism testing problem of Shpilka and Wigderson [STOC 2004]. We also apply these pessimistic estimators to the problem of solving semi-definite covering problems, thus giving a deterministic algorithm for the quantum hypergraph cover problem of Ahslwede and Winter.
机译:本文提出以下结果:1。 Valiant [CACM 1984]引入了学习理论,特别是PAC学习,并从此成为理论和应用计算机科学的主要研究领域。一开始就提出的一个自然问题是,是否存在一些难以学习的功能类别;在诸如单向功能的存在等广泛持有的猜想下,PAC学习很难众所周知,如果PAC学习困难,则P≠NP。我们进一步研究了PAC学习困难的充分必要条件,并证明:(1)ZK≠BPP表示PAC学习困难。 (2)使用标准技术不可能证明PAC学习困难意味着ZK≠BPP。 (3)使用标准技术不可能证明P≠NP意味着ZK≠BPP。这里,“标准技术”指的是各种有效的归约。总之,这些结果表明,PAC学习的难度一方面介于ZK的非平凡性和另一方面NP的硬度之间。此外,从大多数标准技术无法证明与ZK≠BPP或NP≠P相等的意义上来说,PAC学习的难度“严格地”介于两者之间;在证明这些结果时,我们证明了PAC学习与辅助方法之间的新联系输入单向函数,由Ostrovsky和Wigderson [ISTCS 1993]定义,以更好地理解ZK。我们还定义了与PAC学习有关的新问题,我们认为这些新问题是独立的兴趣,并且可能在将来研究PAC学习的复杂性方面很有用。安全的故障定位(FL)协议允许发送方将通过网络到接收方的单个路径上的故障链接定位到本地,即使该路径上的中间节点表现出对抗性。提出了这样的协议,作为使Internet服务提供商能够选择Internet上的高性能路径或执行合同义务的工具。我们给出了FL协议安全性的第一个正式定义,并证明对于此类协议,安全性要求路径上的每个中间节点都具有一些共享的秘密信息(例如,密钥),并且每个黑匣子都构造了安全FL协议随机预言机要求每个中间节点调用随机预言机。这表明实现这种安全性是不现实的,因为中间节点几乎没有动机参与现实世界。3。 Ahlswede和Winter [IEEE Trans。 Inf。 。 [2002]引入了矩阵值随机变量的Chernoff界,这是对实值随机变量的通常Chernoff界的不平凡的概括。我们使用悲观估计量的方法(见Raghavan [JCSS 1988])对它们的边界进行了有效的非随机化。结果,我们对Alon和Roichman [RSA 1994]的构造进行了随机化处理,以有效地构造任何(可能是非阿贝尔)群对数度的展开式Cayley图。这为Shpilka和Wigderson [STOC 2004]的同态测试问题提供了最佳解决方案。我们还将这些悲观估计量应用于解决半确定覆盖问题,从而为Ahslwede和Winter的量子超图覆盖问题提供了确定性算法。

著录项

  • 作者

    Xiao, David.;

  • 作者单位

    Princeton University.;

  • 授予单位 Princeton University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2009
  • 页码 223 p.
  • 总页数 223
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号