Learning bounded unions of Noetherian closed set systems via characteristic sets Yuichi Kameda 1, Hiroo Tokunaga 1 and Akihiro Yamamoto 2 1 Tokyo Metropolitan.

Slides:



Advertisements
Similar presentations
Mathematics of Cryptography Part II: Algebraic Structures
Advertisements

Nondeterministic Finite Automata CS 130: Theory of Computation HMU textbook, Chapter 2 (Sec 2.3 & 2.5)
Relations Relations on a Set. Properties of Relations.
Manipulating Functional Dependencies Zaki Malik September 30, 2008.
Determinization of Büchi Automata
Discrete Mathematics Lecture 5 Alexander Bukharovich New York University.
1 Polynomial Time Probabilistic Learning of a Subclass of Linear Languages with Queries Yasuhiro TAJIMA, Yoshiyuki KOTANI Tokyo Univ. of Agri. & Tech.
CS21 Decidability and Tractability
Weizmann Institute Deciding equality formulas by small domain instantiations O. Shtrichman The Weizmann Institute Joint work with A.Pnueli, Y.Rodeh, M.Siegel.
A Semantic Characterization of Unbounded-Nondeterministic Abstract State Machines Andreas Glausch and Wolfgang Reisig 1.
CSE115/ENGR160 Discrete Mathematics 04/03/12 Ming-Hsuan Yang UC Merced 1.
Firewall Policy Queries Author: Alex X. Liu, Mohamed G. Gouda Publisher: IEEE Transaction on Parallel and Distributed Systems 2009 Presenter: Chen-Yu Chang.
Northwestern University Winter 2007 Machine Learning EECS Machine Learning Lecture 13: Computational Learning Theory.
Discrete Mathematics Lecture 4 Harper Langston New York University.
CS5371 Theory of Computation
FORMAL LANGUAGES, AUTOMATA AND COMPUTABILITY
© Love Ekenberg The Algorithm Concept, Big O Notation, and Program Verification Love Ekenberg.
CS5371 Theory of Computation Lecture 1: Mathematics Review I (Basic Terminology)
A Denotational Semantics For Dataflow with Firing Edward A. Lee Jike Chong Wei Zheng Paper Discussion for.
CSE115/ENGR160 Discrete Mathematics 03/31/11
1 Computational Learning Theory and Kernel Methods Tianyi Jiang March 8, 2004.
1 Foundations of Interval Computation Trong Wu Phone: Department of Computer Science Southern Illinois University Edwardsville.
By relieving the brain of all unnecessary work, a good notation sets it free to concentrate on more advanced problems, and, in effect, increases the mental.
1 Section 3.3 Mathematical Induction. 2 Technique used extensively to prove results about large variety of discrete objects Can only be used to prove.
Gröbner Bases Bernd Sturmfels Mathematics and Computer Science University of California at Berkeley.
The Fundamentals: Algorithms, the Integers & Matrices.
Induction and recursion
Solving fixpoint equations
Chapter 8. Section 8. 1 Section Summary Introduction Modeling with Recurrence Relations Fibonacci Numbers The Tower of Hanoi Counting Problems Algorithms.
Daniel Kroening and Ofer Strichman 1 Decision Procedures in First Order Logic Decision Procedures for Equality Logic Range Allocation.
Learning DFA from corrections Leonor Becerra-Bonache, Cristina Bibire, Adrian Horia Dediu Research Group on Mathematical Linguistics, Rovira i Virgili.
1 Chapter 1 Automata: the Methods & the Madness Angkor Wat, Cambodia.
Week 15 - Wednesday.  What did we talk about last time?  Review first third of course.
SECTION 3 ISOMORPHIC BINARY STRUCTURES Definition Let  S,  and  S’,  ’  be binary algebraic structures. An isomorphism of S with S’ is a one-to-one.
DISCRETE COMPUTATIONAL STRUCTURES CS Fall 2005.
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence Monday, January 22, 2001 William.
Computably Enumerable Semigroups, Algebras, and Groups Bakhadyr Khoussainov The University of Auckland New Zealand Research is partially supported by Marsden.
Discrete Mathematics and Its Applications Sixth Edition By Kenneth Rosen Chapter 8 Relations 歐亞書局.
Computational Learning Theory IntroductionIntroduction The PAC Learning FrameworkThe PAC Learning Framework Finite Hypothesis SpacesFinite Hypothesis Spaces.
Theory of Computation, Feodor F. Dragan, Kent State University 1 TheoryofComputation Spring, 2015 (Feodor F. Dragan) Department of Computer Science Kent.
A Logic of Partially Satisfied Constraints Nic Wilson Cork Constraint Computation Centre Computer Science, UCC.
Scott CH Huang COM5336 Cryptography Lecture 11 Euclidean Domains & Division Algorithm Scott CH Huang COM 5336 Cryptography Lecture 10.
ICS 253: Discrete Structures I Induction and Recursion King Fahd University of Petroleum & Minerals Information & Computer Science Department.
Mathematical Preliminaries
Positively Expansive Maps and Resolution of Singularities Wayne Lawton Department of Mathematics National University of Singapore
Linear Program Set Cover. Given a universe U of n elements, a collection of subsets of U, S = {S 1,…, S k }, and a cost function c: S → Q +. Find a minimum.
1 First order theories (Chapter 1, Sections 1.4 – 1.5) From the slides for the book “Decision procedures” by D.Kroening and O.Strichman.
Great Theoretical Ideas in Computer Science.
Program Analysis and Verification Spring 2015 Program Analysis and Verification Lecture 13: Abstract Interpretation V Roman Manevich Ben-Gurion University.
8.4 Closures of Relations Definition: The closure of a relation R with respect to property P is the relation obtained by adding the minimum number of.
1 Covering Non-uniform Hypergraphs Endre Boros Yair Caro Zoltán Füredi Raphael Yuster.
Copyright © Zeph Grunschlag, Induction Zeph Grunschlag.
Donghyun (David) Kim Department of Mathematics and Physics North Carolina Central University 1 Chapter 0 Introduction Some slides are in courtesy of Prof.
Machine Learning Chapter 7. Computational Learning Theory Tom M. Mitchell.
Approximation Algorithms based on linear programming.
Week 8 - Wednesday.  What did we talk about last time?  Relations  Properties of relations  Reflexive  Symmetric  Transitive.
Section Recursion 2  Recursion – defining an object (or function, algorithm, etc.) in terms of itself.  Recursion can be used to define sequences.
Discrete Mathematics Chapter 2 The Fundamentals : Algorithms, the Integers, and Matrices. 大葉大學 資訊工程系 黃鈴玲.
Section 9.1. Section Summary Relations and Functions Properties of Relations Reflexive Relations Symmetric and Antisymmetric Relations Transitive Relations.
Chapter 5 1. Chapter Summary  Mathematical Induction  Strong Induction  Recursive Definitions  Structural Induction  Recursive Algorithms.
1 CS 391L: Machine Learning: Computational Learning Theory Raymond J. Mooney University of Texas at Austin.
PROPERTIES OF REGULAR LANGUAGES
Great Theoretical Ideas in Computer Science
3.3 Applications of Maximum Flow and Minimum Cut
Induction and recursion
On Kripke’s Alleged Proof of Church-Turing Thesis
Mathematical Background 1
Copyright © Cengage Learning. All rights reserved.
Presentation transcript:

Learning bounded unions of Noetherian closed set systems via characteristic sets Yuichi Kameda 1, Hiroo Tokunaga 1 and Akihiro Yamamoto 2 1 Tokyo Metropolitan University 2 Kyoto University

Key Concepts In this talk “ learning ” is identification in the limit from positive data. Noetherian Closed Set Systems are classes of languages with algebraic structure as targets of learning. Characteristic sets are used for sufficient conditions for learnability of language classes. They have also another meaning in regarding languages as algebraic objects.

Results Previous work: It is shown that bounded unions of languages are learnable theoretically[Kobayashi, Kapur et al.] and several learning procedures have been proposed on various viewpoints. This talk: We give a schema of learning procedure on bounded unions of certain class of languages, called Noetherian closed set system, by using characteristic sets.

Outline Inductive Inference and Algebra Precise Definitions of Noetherian Closed Set System and Characteristic sets Main Result Example

The purpose of our research Clarifying the properties of learning languages with algebraic structure on both the viewpoint of learning and mathematics. Current subject Learning bounded unions of languages, which have not attracted mathematicians, but are very popular for learning people.

Outline Inductive Inference and Algebra Precise Definitions of Noetherian Closed Set System and Characteristic sets Main Result Example

Inductive Inference and Algebra Some learning people have investigated learning languages with algebraic structure: ideals of Z [Angluin] pattern languages [Angluin] ideals in commutative rings [Stephen & Ventsov]

Examples 72, 48, 60, …, 12,… Hypotheses 72, 24, 12,…  72    Teacher Learning Machine Identification of Ideals of Z from positive data Class of Ideals ・・ ・ nn  n  = { n  x | x is an integer } Computing GCD of Given Examples

Algebra and Inductive Inference Recently some researchers of History of Mathematics have found that the original version of Hilbert’s basis theorem can be regarded as learning. This means Mathematician used "learning" in algebra in late 19 th century. In fact, Hilbert ’ s basis theorem can be regarded as learning.

Hilbert ’ s original paper

Why Set-Union of Ideals? In Mathematics : The set-union of two ideals has not been interested because it is difficult to give its “ meaning ”. In Learning Theory : Finite elasticity of a class of languages ensures identifiability of set union of two languages in it, but does not effective procedure to compute its finite tell-tale.

Outline Inductive Inference and Algebra Precise Definitions of Noetherian Closed Set System and Characteristic sets Main Result Example

Ideals in Commutative Ring A subset I of a ring R is an ideal if the followings are satisfied: 0  I If f  I and g  I, f + g  I If f  I and h  R, h f  I Examples  n  = { x  n | x  Z } for every n  in Z  f, g  = { h f + kg | h, k  Q [X 1,..., X n ]} for every f, g  Q [X 1,..., X n ]

Closed Set Systems(CSS) A mapping C: 2 U  2 U is a closure operator if it satisfies: X  C ( X ) C ( C ( X )) = C ( X ) X  Y  C ( X )  C ( Y ) (  X,Y  U ). X  U is closed if C ( X )  X. A closed set system is a class of closed sets.

Characteristic Sets A finite subset S  L  L is a characteristic set of L in L   L’  L, S  L’  L  L’. S L 

Finite Elasticity(F.E.) L has infinite elasticity if there exist an infinite sequence of elements s 0, s 1, … and languages L 1, L 2, … such that { s 0,s 1,…,s n-1 }  L n and s n  L n.. L has finite elasticity  L does not have infinite elasticity. s0s0 s1s1 s2s2 s n-1 … L1L1 L2L2 LnLn L3L3

Closed Set System and F.E. If L is CSS, then Theorem[de Brecht et al.] L has F.E.  L satisfies the ascending chain condition, i.e. L has no infinite chain of languages L 1 ⊊ L 2 ⊊ … ⊊ L n ⊊ …. A Noetherian closed set system(NCSS) is a CSS that has F.E..

Bounded Unions of Languages L : a class of language. ⋃  k L  L 1 ⋃ … ⋃ L m  L i  L, m  k . Theorem[Motoki-Shinohara-Wright] If L has finite elasticity, then ⋃  k L also has.

Bounded Unions of NCSS L : Noetherian closed set system.  1. ⋃  k L has finite elasticity. 2. Every element of ⋃  k L has a characteristic set. 3. ⋃  k L is identifiable from positive data.

Outline Inductive Inference and Algebra Precise Definitions of Noetherian Closed Set System and Characteristic sets Main Result Example

Main Result Suppose that L is NCSS and ⋃  k L is compact. We give an algorithm schema for learning ⋃  k L under the condition: for  L  L, a char. set of L in ⋃  k L  is computable from char. set of L in L . Compactness ⋃  k L is compact iff L  L 1 ⋃ … ⋃ L m   i s.t. L  L i (  L  L, L 1 ⋃ … ⋃ L m  ⋃  k L ).

Learning Schema Target: L 1 ⋃ … ⋃ L m  ⋃  k L Positive data: f 1, f 2,…, f n,… Step n : By using hypergraph, construct a hypothesis H  ⋃  k L s.t. H  L 1 ⋃ … ⋃ L m, H contains elements of { f 1,…,f n } as many as possible from { f 1,…,f n }.

Construction of Hypergraph Step 1 Set of examples: { f 1 } Set of hyperedges HE 1 : {{ f 1 }} Set of vertices V 1 : { f 1 } f1f1

Construction of Hypergraph Step n Set of vertices V n : { f 1,…,f n } = V n-1 ⋃ { f n } Set of examples: { f 1,…,f n } fnfn f1f1 f2f2 f3f3 f4f4 f n-1 1. Set HE n = HE n-1.

Construction of Hypergraph 2. For  S  V n do If a char. set of C ( S ) in ⋃  k L is contained by V n, then Add S to HE n, and remove all hyperedges contained by S. 3. If no hyperedge has f n, then add { f n }. fnfn f1f1 f2f2 f3f3 f4f4 f n-1

Learning Algorithm of ⋃  k L Repeat 1. Put n=1. 2. Construct a hypergraph G n from { f 1,…,f n }. 3. Choose at most k maximal hyperedges of G n w.r.t. some ordering. 4. Output (at-most) k -tuple in Add 1 to n. forever. The ordering  at 3 can be taken freely provided that C ( S )  C ( S’ )  S  S’.

Outline Inductive Inference and Algebra Precise Definitions of Noetherian Closed Set System and Characteristic sets Main Result Example

Example (Polynomial ideal) Let I be the class of all ideals of polynomial ring Q [ x,y ]. Target:  x 2,y 3  ⋃  x 3,y 2  ⋃  2 I Positive data: x 2, y 3, y 2, x 2 +y 3, x 3, x 3 +y 2,… For  f,g  Q [ x,y ], { f, g, f+g } is a characteristic set of  f,g  in ⋃  2 I.

Example (Polynomial ideal) Step 1 Target:  x 2,y 3  ⋃  x 3,y 2  ⋃  2 I Positive data: x 2, y 3, y 2, x 2 +y 3, x 3, x 3 +y 2,… Hypergraph G 1 : x2x2 Output:  x 2  The set of examples: {x 2 }

Step 2 Hypergraph G 2 : Example (Polynomial ideal) Target:  x 2,y 3  ⋃  x 3,y 2  ⋃  2 I Positive data: x 2, y 3, y 2, x 2 +y 3, x 3, x 3 +y 2,… x2x2 Output:  x 2  ⋃  y 3  y3y3 Output:  x 2  The set of examples: {x 2, y 3 }

Output:  x 2  ⋃  y 3  Hypergraph G 3 : Example (Polynomial ideal) Step 3 Target:  x 2,y 3  ⋃  x 3,y 2  ⋃  2 I Positive data: x 2, y 3, y 2, x 2 +y 3, x 3, x 3 +y 2,… x2x2 Output:  x 2  ⋃  y 2  y3y3 y2y2 (  y 3  is not maximal:  y 3   y 2  since  y 3   y 2  ) The set of examples: {x 2, y 3, y 2 } C ( S )  C ( S’ )  S  S’.

Output:  x 2  ⋃  y 2  Example (Polynomial ideal) Step 4 Target:  x 2,y 3  ⋃  x 3,y 2  ⋃  2 I Positive data: x 2, y 3, y 2, x 2 +y 3, x 3, x 3 +y 2,… x2x2 Output:  x 2,y 3  ⋃  y 2  y3y3 y2y2 x 2 +y 3 Hypergraph G 4 : The set of examples: {x 2, y 3, y 2, x 2 +y 3 } { x 2,y 3,x 2 +y 3 } is a char. set of  x 2,y 3  in ⋃  2 I.

Example (Polynomial ideal) Step 5 Target:  x 2,y 3  ⋃  x 3,y 2  ⋃  2 I Positive data: x 2, y 3, y 2, x 2 +y 3, x 3, x 3 +y 2,… x2x2 Output:  x 2,y 3  ⋃  y 2  y3y3 y2y2 x 2 +y 3 x3x3 Hypergraph G 5 : (  x 3  is not maximal:  x 3   x 2,y 3  since  x 3   x 2,y 3  ) The set of examples: {x 2, y 3, y 2, x 2 +y 3, x 3 }

Output:  x 2,y 3  ⋃  y 2  Example (Polynomial ideal) Step 6 Target:  x 2,y 3  ⋃  x 3,y 2  ⋃  2 I Positive data: x 2, y 3, y 2, x 2 +y 3, x 3, x 3 +y 2,… x2x2 Output:  x 2,y 3  ⋃  x 3,y 2  y3y3 y2y2 x 2 +y 3 x3x3 x 3 +y 2  Target language Hypergraph G 6 : The set of examples: {x 2, y 3, y 2, x 2 +y 3, x 3, x 3 +y 2 } { y 2,x 3,x 3 +y 2 } is a char. set of  x 3,y 2  in ⋃  2 I.

Application The algorithm schema can be applied to learning bounded unions of Tree Pattern Languages.

Conclusion We proposed a learning algorithm schema by combining hypergraph and characteristic sets for bounded unions of Noetherian closed set systems.