Efficient Semantic Communication via Compatible Beliefs Brendan Juba (MIT CSAIL & Harvard) with Madhu Sudan (MSR & MIT)

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

The Data Stream Space Complexity of Cascaded Norms T.S. Jayram David Woodruff IBM Almaden.
Closed Timelike Curves Make Quantum and Classical Computing Equivalent
The Equivalence of Sampling and Searching Scott Aaronson MIT.
An Introduction to Randomness Extractors Ronen Shaltiel University of Haifa Daddy, how do computers get random bits?
Lower Bounds for Non-Black-Box Zero Knowledge Boaz Barak (IAS*) Yehuda Lindell (IBM) Salil Vadhan (Harvard) *Work done while in Weizmann Institute. Short.
Strict Polynomial-Time in Simulation and Extraction Boaz Barak & Yehuda Lindell.
Semantic communication with simple goals is equivalent to on-line learning Brendan Juba (MIT CSAIL & Harvard) with Santosh Vempala (Georgia Tech) Full.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Foundations of Cryptography Lecture 2: One-way functions are essential for identification. Amplification: from weak to strong one-way function Lecturer:
Universal Semantic Communication Brendan Juba (Harvard and MIT) with Madhu Sudan (MSR and MIT) & Oded Goldreich (Weizmann)
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Approximation Algorithms Chapter 14: Rounding Applied to Set Cover.
An Efficient Membership-Query Algorithm for Learning DNF with Respect to the Uniform Distribution Jeffrey C. Jackson Presented By: Eitan Yaakobi Tamar.
COMP 553: Algorithmic Game Theory Fall 2014 Yang Cai Lecture 21.
Gillat Kol joint work with Ran Raz Competing Provers Protocols for Circuit Evaluation.
Learning Juntas Elchanan Mossel UC Berkeley Ryan O’Donnell MIT Rocco Servedio Harvard.
Universal Communication Brendan Juba (MIT) With: Madhu Sudan (MIT)
Theory of Computing Lecture 16 MAS 714 Hartmut Klauck.
Dana Moshkovitz. Back to NP L  NP iff members have short, efficiently checkable, certificates of membership. Is  satisfiable?  x 1 = truex 11 = true.
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
1 The Monte Carlo method. 2 (0,0) (1,1) (-1,-1) (-1,1) (1,-1) 1 Z= 1 If  X 2 +Y 2  1 0 o/w (X,Y) is a point chosen uniformly at random in a 2  2 square.
Complexity 26-1 Complexity Andrei Bulatov Interactive Proofs.
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
The Goldreich-Levin Theorem: List-decoding the Hadamard code
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
Foundations of Privacy Lecture 11 Lecturer: Moni Naor.
PSPACE  IP Proshanto Mukherji CSC 486 April 23, 2001.
Learning and Planning for POMDPs Eyal Even-Dar, Tel-Aviv University Sham Kakade, University of Pennsylvania Yishay Mansour, Tel-Aviv University.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Of 33 March 1, 2011 Semantic UCLA1 Universal Semantic Communication Madhu Sudan Microsoft Research + MIT Joint with Oded Goldreich (Weizmann)
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Limits of Local Algorithms in Random Graphs
Ragesh Jaiswal Indian Institute of Technology Delhi Threshold Direct Product Theorems: a survey.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Theory of Computing Lecture 17 MAS 714 Hartmut Klauck.
CS151 Complexity Theory Lecture 13 May 11, Outline proof systems interactive proofs and their power Arthur-Merlin games.
Discrete Logarithm(s) (DLs) Fix a prime p. Let a, b be nonzero integers (mod p). The problem of finding x such that a x ≡ b (mod p) is called the discrete.
1 Markov Decision Processes Infinite Horizon Problems Alan Fern * * Based in part on slides by Craig Boutilier and Daniel Weld.
Communication vs. Computation S Venkatesh Univ. Victoria Presentation by Piotr Indyk (MIT) Kobbi Nissim Microsoft SVC Prahladh Harsha MIT Joe Kilian NEC.
Interactive proof systems Section 10.4 Giorgi Japaridze Theory of Computability.
1 Markov Decision Processes Infinite Horizon Problems Alan Fern * * Based in part on slides by Craig Boutilier and Daniel Weld.
Parallel computation Section 10.5 Giorgi Japaridze Theory of Computability.
Jennifer Campbell November 30,  Problem Statement and Motivation  Analysis of previous work  Simple - competitive strategy  Near optimal deterministic.
Secure Computation Lecture Arpita Patra. Recap >> Improving the complexity of GMW > Step I: Offline: O(n 2 c AND ) OTs; Online: i.t., no crypto.
The Price of Uncertainty in Communication Brendan Juba (Washington U., St. Louis) with Mark Braverman (Princeton)
Data Stream Algorithms Lower Bounds Graham Cormode
10/14/2008Semantic Communication1 Universal Semantic Communication Madhu Sudan MIT CSAIL Joint work with Brendan Juba (MIT CSAIL).
Complexity 24-1 Complexity Andrei Bulatov Interactive Proofs.
The Message Passing Communication Model David Woodruff IBM Almaden.
Of 17 Limits of Local Algorithms in Random Graphs Madhu Sudan MSR Joint work with David Gamarnik (MIT) 7/11/2013Local Algorithms on Random Graphs1.
Approximation Algorithms based on linear programming.
Theory of Computational Complexity Yuji Ishikawa Avis lab. M1.
Universal Semantic Communication
HIERARCHY THEOREMS Hu Rui Prof. Takahashi laboratory
Universal Semantic Communication
Universal Semantic Communication
General Strong Polarization
Maximally Recoverable Local Reconstruction Codes
Enumerating Distances Using Spanners of Bounded Degree
B504/I538: Introduction to Cryptography
Pseudo-deterministic Proofs
Universal Semantic Communication
Universal Semantic Communication
Cryptography Lecture 8.
Universal Semantic Communication
Universal Semantic Communication
Closed Timelike Curves Make Quantum and Classical Computing Equivalent
General Strong Polarization
General Strong Polarization
Presentation transcript:

Efficient Semantic Communication via Compatible Beliefs Brendan Juba (MIT CSAIL & Harvard) with Madhu Sudan (MSR & MIT)

1.Motivation 2.Beliefs model 3.Sketch of result 2

Miscommunication happens… Got that? Q: CAN COMPUTERS COPE WITH MISCOMMUNICATION AUTOMATICALLY?? 3

Printer Defining (mis)communication Printer driver Printer firmware ENVIRONME NT INTERFACE FIXED IN ADVANCE 4

ENVIRONMEN T Goal of computation (function f) x x f(x) “user returns f(x)?” “user” “server” This talk: f will be PSPACE- complete 5

ENVIRONMEN T S -universal user (for computing f) x x f(x) “user returns f(x)?” S 6

Formally, U is a S -universal user for computing f if  servers S  S  poly. running time for U  inputs x, initial states of U & S Pr [ ] ≥ ⅔ S -universal user (for computing f) On input x with S, U runs poly(|x|) steps and U’s final output is f(x) [JS’08]: can construct universal users for computing PSPACE-complete f for maximally large class S 7

Problem: Password-protected servers ENVIRONMEN T x x f(x) 8

Theorem [JS08,GJS09]. S -Universal users for classes S containing password-protected servers and goals that require the server to act must run for Ω(2 l ) rounds with servers with passwords of length l. PROMISES MORE THAN WE WANTED! CAN WE REFINE AWAY PASSWORDS?? 9

1.Motivation 2.Beliefs model 3.Sketch of result 10

Server’s Beliefs Q x x f(x) t U,S (|x|) Def’n: Q -Benchmark running time T Q,S (n) = E U  Q [t U,S (n)] I’VE CHOSEN AN S WITH POLYNOMIAL Q - BENCHMARK RUNNING TIME SO, NO PASSWORD!! 11

Q Q WHY DOESN’T IT WORK?? PREFIXING A MESSAGE WITH %!PS-Adobe IS THE MOST NATURAL THING IN THE WORLD. x x MORAL: NEED “SIMILAR” BELIEFS… THAT ISN’T A “PASSWORD.” 12

Compatibility P Q  ( P, Q ) =   min {P(  ),Q(  )} = 1-|P- Q| TV 13

Compatibility controls overhead of universal communication Theorem. Let P be a sampleable distribution, suppose every server S  S has a belief distribution Q S. For PSPACE-complete , there exist polys r & w such that if strategies from Q S decide  with S, there is a user strategy U P that computes  with any S  S on x of length n in time w( 1 /  ( P, Q ),n) × (T Q,S o r)(n) RECALL: “benchmark time” T Q,S (n) = E U  Q [t U,S (n)], “compatibility”  ( P, Q ) =   min {P(  ),Q(  )} Can recover [JS’08] by taking P = length-weighted uniform Q S = δ U(S) (for U(S) helped by S) DEPENDENCE ON SERVER? DEPENDENCE ON BENCHMARK TIME W.R.T SERVER BELIEFS DEPENDENCE ON COMPATIBILE BELIEFS 14

Key points 1.Server designers can evaluate benchmark time w.r.t. their beliefs 2.Compatible beliefs lead to low overhead (beyond benchmark time) 3.Beliefs capture natural approaches 15

1.Motivation 2.Beliefs model 3.Sketch of result 16

Starting point: [JS’08] 1.Enumerate algorithms U’: give each constant share of running time, repeatedly double running time (cf. Levin’73) 2.Use U’ with S to simulate interactive proof system for , return answer if successful (exploits efficient prover strategy using  ) SAMPLE FROM P REPEATEDLY DOUBLE # OF SAMPLES PER TIME BOUND, INTRODUCE DOUBLED MAXIMUM TIME BOUND High weight in P corresponds to short programs in enumeration 17

Analysis in three easy steps 1.Markov’s inequality: For poly. r from proof system, U’  Q S, see success w.p. 1-γ if we use U’ run for ( 1 / γ )(T Q,S o r)(n) steps 2.See success w.p. 1-γ- |P-Q| TV =  ( P, Q S )-γ for U’  P instead 3.So, if we run 2/  ( P, Q S ) samples from P for ( 2 /  ( P, Q ) )(T Q,S o r)(n) steps each, see success with constant probability So, try using γ =  ( P, Q S )/2 w also contains: overhead from simulating proof system, logarithmic overhead in 1/  ( P, Q S ) (i distinct bounds in phase i) 18

Compatibility controls overhead of universal communication Theorem. Let P be a sampleable distribution, suppose every server S  S has a belief distribution Q S. For PSPACE-complete , there exist polys r & w such that if strategies from Q S decide  with S, there is a user strategy U P that computes  with any S  S on x of length n in time w( 1 /  ( P, Q ),n) × (T Q,S o r)(n) RECALL: “benchmark time” T Q,S (n) = E U  Q [t U,S (n)], “compatibility”  ( P, Q ) =   min {P(  ),Q(  )} Actual dependence: Õ( 1 /  ( P, Q ) 2 ) 19

RECAP: We refined the semantic communication model to capture natural settings in which flexible communication is possible with low overhead. 20

Open problem Construct a server with low benchmark running time for a natural goal and belief distribution! 21

Key points 1.Server designers can evaluate benchmark time w.r.t. their beliefs 2.Compatible beliefs lead to low overhead (beyond benchmark time) 3.Beliefs capture natural approaches RECALL: “benchmark time” T Q,S (n) = E U  Q [t U,S (n)] RECALL: “compatibility”  ( P, Q ) =   min{P(  ),Q(  )}, overhead is Õ( 1 /  ( P, Q ) 2 ) FIN. 22