Of 13 October 6-7, 2010Emerging Frontiers of Information: Kickoff 1 Madhu Sudan Microsoft Research + MIT TexPoint fonts used in EMF. TexPoint fonts used.

Slides:



Advertisements
Similar presentations
MASSIMO FRANCESCHETTI University of California at San Diego Information-theoretic and physical limits on the capacity of wireless networks TexPoint fonts.
Advertisements

Of 23 09/24/2013HLF: Reliable Meaningful Communication1 Reliable Meaningful Communication Madhu Sudan Microsoft, Cambridge, USA.
Of 35 05/30/2012CSOI-Summer: Uncertainty in Communication1 Communication amid Uncertainty Madhu Sudan Microsoft, Cambridge, USA Based on: Universal Semantic.
Of 19 03/21/2012CISS: Beliefs in Communication1 Efficient Semantic Communication & Compatible Beliefs Madhu Sudan Microsoft, New England Based on joint.
Of 31 09/19/2011UIUC: Communication & Computation1 Communication & Computation A need for a new unifying theory Madhu Sudan Microsoft, New England.
Of 10 09/27/2011Communication, Computing & Technology: Communication, Computing, & Technology Madhu Sudan MSR New England.
Of 13 10/08/2013MSRNE 5 th Anniversary: Communication Amid Uncertainty1 Communication Amid Uncertainty Madhu Sudan Microsoft Research.
Semantic communication with simple goals is equivalent to on-line learning Brendan Juba (MIT CSAIL & Harvard) with Santosh Vempala (Georgia Tech) Full.
Of 29 12/02/2013Purdue: Uncertainty in Communication1 Communication amid Uncertainty Madhu Sudan Microsoft, Cambridge, USA Based on: -Universal Semantic.
Of 24 11/20/2012TIFR: Deterministic Communication Amid Uncertainty1 ( Deterministic ) Communication amid Uncertainty Madhu Sudan Microsoft, New England.
Of 30 10/31/2013Cornell: Uncertainty in Communication1 Communication amid Uncertainty Madhu Sudan Microsoft, Cambridge, USA Based on: -Universal Semantic.
Of 30 09/16/2013PACM: Uncertainty in Communication1 Communication amid Uncertainty Madhu Sudan Microsoft, Cambridge, USA Based on: -Universal Semantic.
February Semantic CMU1 Semantic Goal-Oriented Communication Madhu Sudan Microsoft Research + MIT Joint with Oded Goldreich (Weizmann)
CPU Review and Programming Models CT101 – Computing Systems.
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
The design process IACT 403 IACT 931 CSCI 324 Human Computer Interface Lecturer:Gene Awyzio Room:3.117 Phone:
Of 7 10/01/2013LIDS Lunch: Communication Amid Uncertainty1 Communication Amid Uncertainty Madhu Sudan Microsoft Research.
Semantic Communication Madhu Sudan (based on joint work with Brendan Juba (MIT); and upcoming work with Oded Goldreich (Weizmann) & J. )
Of 30 09/04/2012ITW 2012: Uncertainty in Communication1 Communication amid Uncertainty Madhu Sudan Microsoft, Cambridge, USA Based on: Universal Semantic.
Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
Of 29 May 2, 2011 Semantic Northwestern1 Universal Semantic Communication Madhu Sudan Microsoft Research Joint with Oded Goldreich (Weizmann)
Nir Piterman Department of Computer Science TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAA Bypassing Complexity.
Of 27 01/06/2015CMI: Uncertain Communication1 Communication Amid Uncertainty Madhu Sudan Microsoft Research Based on Juba, S. (STOC 2008, ITCS 2011) Juba,
Of 14 01/03/2015ISCA-2015: Reliable Meaningful Communication1 Reliable Meaningful Communication Madhu Sudan Microsoft, Cambridge, USA.
Of 32 October 19, 2010Semantic U.Penn. 1 Semantic Goal-Oriented Communication Madhu Sudan Microsoft Research + MIT Joint with Oded Goldreich.
Of 10 Uncertainty in Communication1 Communication amid Uncertainty Madhu Sudan Microsoft, Cambridge, USA Based on: Universal Semantic.
Of 12 03/22/2012CISS: Compression w. Uncertain Priors1 Compression under uncertain priors Madhu Sudan Microsoft, New England Based on joint works with:
Chapter 6 Information Theory
Linear Codes for Distributed Source Coding: Reconstruction of a Function of the Sources -D. Krithivasan and S. Sandeep Pradhan -University of Michigan,
Of 30 September 22, 2010Semantic Berkeley 1 Semantic Goal-Oriented Communication Madhu Sudan Microsoft Research + MIT Joint with Oded Goldreich.
Of 33 March 1, 2011 Semantic UCLA1 Universal Semantic Communication Madhu Sudan Microsoft Research + MIT Joint with Oded Goldreich (Weizmann)
Of 35 05/16/2012CTW: Communication and Computation1 Communication amid Uncertainty Madhu Sudan Microsoft, Cambridge, USA Based on: Universal Semantic Communication.
The design process z Software engineering and the design process for interactive systems z Standards and guidelines as design rules z Usability engineering.
Day 10 Hardware Fault Tolerance RAID. High availability All servers should be on UPSs –2 Types Smart UPS –Serial cable connects from UPS to computer.
C&O 355 Mathematical Programming Fall 2010 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
Artificial Intelligence Introduction (2). What is Artificial Intelligence ?  making computers that think?  the automation of activities we associate.
The Operational Meaning of Min- and Max-Entropy
Host and Application Security Lesson 3: What is Information?
Communication & Computing Madhu Sudan ( MSR New England ) Theories of.
Analogue vs Digital. Analogue  Lots of different frequencies, lots of different amplitudes  Wave recorded as it is.
The Operational Meaning of Min- and Max-Entropy Christian Schaffner – CWI Amsterdam, NL joint work with Robert König – Caltech Renato Renner – ETH Zürich,
11/3/2008Communication & Computation1 A need for a new unifying theory Madhu Sudan MIT CSAIL.
2/2/2009Semantic Communication: MIT TOC Colloquium1 Semantic Goal-Oriented Communication Madhu Sudan Microsoft Research + MIT Joint with Oded Goldreich.
Digital Recording. Digital recording is different from analog in that it doesn’t operate in a continuous way; it breaks a continuously varying waveform.
Superposition encoding A distorted version of is is encoded into the inner codebook Receiver 2 decodes using received signal and its side information Decoding.
Of 27 August 6, 2015KAIST: Reliable Meaningful Communication1 Reliable Meaningful Communication Madhu Sudan Microsoft Research.
Stored Programs In today’s lesson, we will look at: what we mean by a stored program computer how computers store and run programs what we mean by the.
Detecting Incapacity Graeme Smith IBM Research Joint Work with John Smolin QECC 2011 December 6, 2011 TexPoint fonts used in EMF. Read the TexPoint manual.
Of 27 12/03/2015 Boole-Shannon: Laws of Communication of Thought 1 Laws of Communication of Thought? Madhu Sudan Harvard.
Of 22 10/07/2015UMass: Uncertain Communication1 Communication Amid Uncertainty Madhu Sudan Microsoft Research Based on Juba, S. (STOC 2008, ITCS 2011)
Of 22 10/30/2015WUSTL: Uncertain Communication1 Communication Amid Uncertainty Madhu Sudan Harvard Based on Juba, S. (STOC 2008, ITCS 2011) Juba, S. (STOC.
Interactive Channel Capacity. [Shannon 48]: A Mathematical Theory of Communication An exact formula for the channel capacity of any noisy channel.
10/14/2008Semantic Communication1 Universal Semantic Communication Madhu Sudan MIT CSAIL Joint work with Brendan Juba (MIT CSAIL).
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (1) The Operating System.
System Software (1) The Operating System
Communication Amid Uncertainty
Computer Organization and Machine Language Programming CPTG 245
Sampling of min-entropy relative to quantum knowledge Robert König in collaboration with Renato Renner TexPoint fonts used in EMF. Read the TexPoint.
Communication amid Uncertainty
Universal Semantic Communication
Communication & Computation A need for a new unifying theory
CS 154, Lecture 6: Communication Complexity
Communication Amid Uncertainty
CRYPTOGRAPHY קריפטוגרפיה Thu 15:45-18:15.
Uncertain Compression
Universal Semantic Communication
Universal Semantic Communication
Communicating Efficiently
Universal Semantic Communication
What should I talk about? Aspects of Human Communication
Presentation transcript:

of 13 October 6-7, 2010Emerging Frontiers of Information: Kickoff 1 Madhu Sudan Microsoft Research + MIT TexPoint fonts used in EMF. TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A Read the TexPoint manual before you delete this box.: A A A A Communication & Computation A need for a new unifying theory

of 13 04/28/2009UT-Austin: Communication & Computation2 Theory of Communication Shannon’s architecture for Shannon’s architecture for communication over noisy channel communication over noisy channel Yields reliable communication Yields reliable communication (and storage (= communication across time)). (and storage (= communication across time)). Noisy Channel Encoder Decoder Y Ŷ m = E(m) D(Ŷ) = m?

of 13 Encoders & Decoders? Mathematically: (arbitrary) functions. Mathematically: (arbitrary) functions. Physically: Pieces of hardware – to compute certain functions. Physically: Pieces of hardware – to compute certain functions. (Mathematical/Physical question): (Mathematical/Physical question): Why should the set of functions required have nice hardware to compute them? Why should the set of functions required have nice hardware to compute them? October 6-7, 2010Emerging Frontiers of Information: Kickoff3

of 13 04/28/2009UT-Austin: Communication & Computation4 Theory of Computing Turing architecture Turing architecture FiniteState Control Control R/W UniversalMachine Encodings of other machines One machine to rule them all! → von Neumann architecture CPU RAM

of 13 Consequence Any ((polynomial time) computable) function does have nice hardware. Any ((polynomial time) computable) function does have nice hardware. However … However … Requires reliable CPU $ RAM Requires reliable CPU $ RAM Requires reliable RAM Requires reliable RAM Conclusion: Conclusion: Computing needs Communication Computing needs Communication Communication needs Computing Communication needs Computing (we are extremely lucky to get out of the loop) (we are extremely lucky to get out of the loop) October 6-7, 2010Emerging Frontiers of Information: Kickoff5

of 13 ~ 70 years since Computing and Communication thriving Computing and Communication thriving Separate theoretically Separate theoretically Unified physically (in gadgets in my pocket). Unified physically (in gadgets in my pocket). My Opinion: Need to unify the theories My Opinion: Need to unify the theories Why? Why? Need to know the limits of what can be done Need to know the limits of what can be done Need to know what is being done? Need to know what is being done? What are ? What are ? Modern practice has rich mix of computing/communication apps? What is the problem space? What is the solution space? Modern practice has rich mix of computing/communication apps? What is the problem space? What is the solution space? October 6-7, 2010Emerging Frontiers of Information: Kickoff6

of 13 Communication: Goals, Semantics To make for reliable, useful, communication: To make for reliable, useful, communication: Need to formalize: Goals of communication Need to formalize: Goals of communication In each usage In each usage Why is each player communicating? What is the end effect that it desires? Why is each player communicating? What is the end effect that it desires? What is each player assuming about others? What is each player assuming about others? How will it know if something goes wrong? How will it know if something goes wrong? Communication should preserve meaning: Communication should preserve meaning: Players allow for, and recover from, misunderstandings at endpoints. Players allow for, and recover from, misunderstandings at endpoints. October 6-7, 2010Emerging Frontiers of Information: Kickoff7

of 13 October 6-7, 2010Emerging Frontiers of Information: Kickoff8 The Meaning of Bits Why did miscommunication occur? Why did miscommunication occur? Alice assumed Bob knows colloquial English; Alice assumed Bob knows colloquial English; But she’s actually talking to some Bob’ who doesn’t. But she’s actually talking to some Bob’ who doesn’t. Channel Alice Bob Bob Bob Freeze!

of 13 Modelling Miscommunication Classical Shannon Model October 6-7, 2010Emerging Frontiers of Information: Kickoff9 A B Channel B2B2B2B2 AkAkAkAk A3A3A3A3 A2A2A2A2 A1A1A1A1 B1B1B1B1 B3B3B3B3 BjBjBjBj Semantic Communication Model

of 13 Our claims ( based on joint works with Juba, Goldreich, Kalai, Khanna) Semantic Communication can be achieved with almost full diversity Semantic Communication can be achieved with almost full diversity If goals of communication are formally captured and “sensible”; and players are “helpful” [GJS] If goals of communication are formally captured and “sensible”; and players are “helpful” [GJS] Communication does offer advantages even in purely informational settings [JS1] Communication does offer advantages even in purely informational settings [JS1] Can be attained almost w.l.o.efficiency [JS2] Can be attained almost w.l.o.efficiency [JS2] Explains difference between engineered and natural communication (e.g., ambiguity in natural language) [JKKS] Explains difference between engineered and natural communication (e.g., ambiguity in natural language) [JKKS] October 6-7, 2010Emerging Frontiers of Information: Kickoff10

of 13 Communicating Knowledge [JS1] Knowledge (X) = Subset of Information (X) Knowledge (X) = Subset of Information (X) Useful/Useable Useful/Useable Not known without X. [Goldwasser,Micali,Rackoff ~86] Not known without X. [Goldwasser,Micali,Rackoff ~86] Knowledge · Information (usually <<) Knowledge · Information (usually <<) In all practical settings: Suffices to communication Knowledge. In all practical settings: Suffices to communication Knowledge. Can be communicated with misunderstanding. Can be communicated with misunderstanding. Can be used to overcome misunderstanding. Can be used to overcome misunderstanding. Because it is useful! Because it is useful! October 6-7, 2010Emerging Frontiers of Information: Kickoff11

of 13 Going Forward Need to build robust theory of “why (anyone/everyone) communicate(s)” Need to build robust theory of “why (anyone/everyone) communicate(s)” Combine with Semantics Combine with Semantics Needed to improve Needed to improve Improve Reliability Improve Reliability Reduce Vulnerability Reduce Vulnerability Increase efficiency Increase efficiency Safely transfer all information to digital form. Safely transfer all information to digital form. October 6-7, 2010Emerging Frontiers of Information: Kickoff12 Channel B2B2B2B2 AkAkAkAk A3A3A3A3 A2A2A2A2 A1A1A1A1 B1B1B1B1 B3B3B3B3 BjBjBjBj

of 13 References [JS1]: Juba and Sudan, STOC [JS1]: Juba and Sudan, STOC [GJS]: Goldreich, Juba, and Sudan, ECCC 2009 [GJS]: Goldreich, Juba, and Sudan, ECCC 2009 [JS2]: Juba and Sudan, ICS 2011 (to appear) [JS2]: Juba and Sudan, ICS 2011 (to appear) [JKKS]: Juba, Kalai, Khanna, Sudan, ICS 2011 (to appear) [JKKS]: Juba, Kalai, Khanna, Sudan, ICS 2011 (to appear) October 6-7, 2010Emerging Frontiers of Information: Kickoff13