MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

Slides:



Advertisements
Similar presentations
Polylogarithmic Private Approximations and Efficient Matching
Advertisements

Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Limitations of Quantum Advice and One-Way Communication Scott Aaronson UC Berkeley IAS Useful?
New Evidence That Quantum Mechanics Is Hard to Simulate on Classical Computers Scott Aaronson Parts based on joint work with Alex Arkhipov.
Solving Hard Problems With Light Scott Aaronson (Assoc. Prof., EECS) Joint work with Alex Arkhipov vs.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Universal Communication Brendan Juba (MIT) With: Madhu Sudan (MIT)
CIS 5371 Cryptography 3b. Pseudorandomness.
Of 30 09/04/2012ITW 2012: Uncertainty in Communication1 Communication amid Uncertainty Madhu Sudan Microsoft, Cambridge, USA Based on: Universal Semantic.
22C:19 Discrete Structures Integers and Modular Arithmetic
Of 27 01/06/2015CMI: Uncertain Communication1 Communication Amid Uncertainty Madhu Sudan Microsoft Research Based on Juba, S. (STOC 2008, ITCS 2011) Juba,
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Great Theoretical Ideas in Computer Science.
Computational problems, algorithms, runtime, hardness
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
The Brick Wall: NP-Completeness Christopher King Joshua Greenspan.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Computational Complexity, Physical Mapping III + Perl CIS 667 March 4, 2004.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Algorithmic Problems in Algebraic Structures Undecidability Paul Bell Supervisor: Dr. Igor Potapov Department of Computer Science
CS10 The Beauty and Joy of Computing Lecture #23 : Limits of Computing Thanks to the success of the Kinect, researchers all over the world believe.
Lecture 20: April 12 Introduction to Randomized Algorithms and the Probabilistic Method.
A Brief Introduction To The Theory of Computer Science and The PCP Theorem By Dana Moshkovitz Faculty of Mathematics and Computer Science The Weizmann.
Introduction to Software Engineering CS-300 Fall 2005 Supreeth Venkataraman.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
Computer Security CS 426 Lecture 3
Of 35 05/16/2012CTW: Communication and Computation1 Communication amid Uncertainty Madhu Sudan Microsoft, Cambridge, USA Based on: Universal Semantic Communication.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Sublinear time algorithms Ronitt Rubinfeld Computer Science and Artificial Intelligence Laboratory (CSAIL) Electrical Engineering and Computer Science.
Of 28 Probabilistically Checkable Proofs Madhu Sudan Microsoft Research June 11, 2015TIFR: Probabilistically Checkable Proofs1.
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Scott Perryman Jordan Williams.  NP-completeness is a class of unsolved decision problems in Computer Science.  A decision problem is a YES or NO answer.
Great Theoretical Ideas in Computer Science.
Theory of Computing Lecture 15 MAS 714 Hartmut Klauck.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
RESOURCES, TRADE-OFFS, AND LIMITATIONS Group 5 8/27/2014.
11/3/2008Communication & Computation1 A need for a new unifying theory Madhu Sudan MIT CSAIL.
Instructor: Shengyu Zhang 1. Tractable While we have introduced many problems with polynomial-time algorithms… …not all problems enjoy fast computation.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Introduction to Quantum Key Distribution
Umans Complexity Theory Lectures Lecture 1a: Problems and Languages.
Beauty and Joy of Computing Limits of Computing Ivona Bezáková CS10: UC Berkeley, April 14, 2014 (Slides inspired by Dan Garcia’s slides.)
Computer Science in Context Evangelos E. Milios Professor and Graduate Coordinator Faculty of Computer Science Dalhousie University.
CS10: The Beauty and Joy of Computing Lecture #22 Limits of Computing Warning sign posted at Stern Hall. Also, Apple releases new operating.
Of 22 10/07/2015UMass: Uncertain Communication1 Communication Amid Uncertainty Madhu Sudan Microsoft Research Based on Juba, S. (STOC 2008, ITCS 2011)
Of 22 10/30/2015WUSTL: Uncertain Communication1 Communication Amid Uncertainty Madhu Sudan Harvard Based on Juba, S. (STOC 2008, ITCS 2011) Juba, S. (STOC.
CPS Computational problems, algorithms, runtime, hardness (a ridiculously brief introduction to theoretical computer science) Vincent Conitzer.
The Beauty and Joy of Computing Lecture #23 Limits of Computing Researchers at Facebook and the University of Milan found that the avg # of “friends” separating.
CS 461 – Nov. 18 Section 7.1 Overview of complexity issues –“Can quickly decide” vs. “Can quickly verify” Measuring complexity Dividing decidable languages.
10/14/2008Semantic Communication1 Universal Semantic Communication Madhu Sudan MIT CSAIL Joint work with Brendan Juba (MIT CSAIL).
狄彥吾 (Yen-Wu Ti) 華夏技術學院資訊工程系 Property Testing on Combinatorial Objects.
CES 592 Theory of Software Systems B. Ravikumar (Ravi) Office: 124 Darwin Hall.
CMPT 308 — Computability and Complexity Fall 2004 Instructor: Andrei Bulatov, TA: Ramsay Dyer, Learning.
Lecture 20 CSE 331 July 30, Longest path problem Given G, does there exist a simple path of length n-1 ?
INCS 741: Cryptography Overview and Basic Concepts.
Sub-fields of computer science. Sub-fields of computer science.
Universal Semantic Communication
Introduction to Randomized Algorithms and the Probabilistic Method
Big Ideas in Computer Science
Universal Semantic Communication
Foundations of Computer Science
Communication Amid Uncertainty
Uncertain Compression
Algebraic Property Testing
Quantum Computing and the Quest for Quantum Computational Supremacy
Universal Semantic Communication
Universal Semantic Communication
Universal Semantic Communication
Universal Semantic Communication
Presentation transcript:

MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL

MIT Computer Science & Artificial Intelligence Laboratory 2 Overview Part I: Introduction to Theory of Computation. Part II: Perspective on (immediate) relevance. Part III: A current research direction. –Introverted Algorithms –Communication with errors: Meaning of bits

MIT Computer Science & Artificial Intelligence Laboratory 3 Part I: Introduction to Theory of CS

MIT Computer Science & Artificial Intelligence Laboratory 4 Theory of Computing Mathematical study of Computation and its consequences. Computation: Sequence of simple steps, leading to complex change in information. Measures: Efficiency of algorithm/program: –Depends on hardware and implementation. Can ask how it scales? –If I double the hardware capacity (speed/memory) *Will this increase the biggest size of problem I can solve by constant factor? (polynomial solution) *Or by additive constant? (exponential solution)

MIT Computer Science & Artificial Intelligence Laboratory 5 Theory of Computing Mathematical study of Computation and its consequences. Computation: Sequence of simple steps, leading to complex change in information. Issues: –Algorithms: Design efficient sequence of steps that produce a desired effect. What is efficient? –Complexity: When is inefficiency inherent? –Implications: What effect does (in)efficiency have on human (intelligent) interaction? Surprisingly broad in scope and impact.

MIT Computer Science & Artificial Intelligence Laboratory 6 Example: Integer Arithmetic Addition: Multiplication: Factoring: Linear!

MIT Computer Science & Artificial Intelligence Laboratory Example: Integer Arithmetic Addition: Linear! Multiplication: Factoring? x Quadratic! Fastest? Not Linear?

MIT Computer Science & Artificial Intelligence Laboratory 8 Addition: Linear! Multiplication: Quadratic! Fastest? Not-linear Factoring? Write as product of two integers (each less than ) Inverse of above problem. –Not known to be linear/quadratic/cubic. –Believed to require exponential time. Example: Integer Arithmetic

MIT Computer Science & Artificial Intelligence Laboratory 9 Algorithms: Given a task (e.g., multiplication) find fast algorithms. –First algorithm we think of may not be fastest. Complexity: Prove lower bounds on resources required to solve problem. –Is multiplication harder than addition? –Is factoring harder than multiplication? Implications: Cryptography … –Economics: Markets implement efficient computation. –Biology: Nature implements efficient computation. –Networks: Errors implement efficient computation. Fundamental quests of CS Theory

MIT Computer Science & Artificial Intelligence Laboratory 10 Long-range questions Is “P=NP?” –Formally, Is all computation reversible? (e.g., multiplication vs. factoring?) –Philosophically, can every designer (mathematician, physicist, engineer, biologist) be replaced by a computer? -(Most of us don’t expect this). -Can we factor integers efficiently? -(Hopefully, still no). -If not, can we build secure communication based on this? -Led to RSA. Still many challenges today.

MIT Computer Science & Artificial Intelligence Laboratory 11 Modern addenda to long-term quests Is the universe random? –Maybe … if so: *Can build efficient algorithms this way (modern examples due to Karger, Rubinfeld, Indyk, Kelner) *Can synchronize distributed systems (essential, as shown by Lynch et al.) *Can generate and preserve secrets (essential, as shown by Goldwasser and Micali). –Maybe not … if so *Might still look random to us, because P ≠ NP. (Long history … Blum, Micali, Yao) Is the universe quantum? Factoring easy (Shor)

MIT Computer Science & Artificial Intelligence Laboratory 12 Current quests in computation Algorithms for Massive data sets –How can we leverage the computational power of a laptop, to understand data such as the WWWMain issue: Massive data – won’t fit in our storage. –Factors in our favor: *We can perform random sampling *We don’t have to deliver “guaranteed answers” –Many Results [Karger, Vempala, Rubinfeld, Indyk] *Can tell if there’s a “trend change” [Rubinfeld et al.] *Can tell if a signal has high-intensity in some frequency. [Indyk et al.] –Underlying emphasis on Randomness.

MIT Computer Science & Artificial Intelligence Laboratory 13 Part II: Perspective of theory

MIT Computer Science & Artificial Intelligence Laboratory 14 History of theoretical CS 1930s: Turing – invented Turing machine. –Universality: One machine implements all algorithms. –Why? To model thought/reasoning/logic * theorems and proofs –Became foundation of modern computers (von Neumann) 1960s: Non-trivial algorithms: –Peterson – BCH decoder –Cooley-Tukey – FFT –Dijkstra – shortest paths 1970s: NP-completeness, Cryptography, RSA. 1990s: Internet algorithms (Yahoo!, Akamai, Google).

MIT Computer Science & Artificial Intelligence Laboratory 15 Theory vs. Practice Theoretical Perspective –Focus on Long-term time horizon; not very close attention to current nature of: *Hardware *Domain-specific information *Solution feasibility Why should you care (today?) –Lessons learned from past are useful (theories more important than theorems). –Good insight into problems of the future. –Occasionally … solutions useful today!

MIT Computer Science & Artificial Intelligence Laboratory 16 Part III: Recent Research Problems, Solutions

MIT Computer Science & Artificial Intelligence Laboratory 17 Part IIIa: Introverted Algorithms

MIT Computer Science & Artificial Intelligence Laboratory 18 Sublinear time algorithms [R. Rubinfeld, P. Valiant] Typical Algorithmic Tasks. –Given x, compute some f(x) in time |x|. Linear time! Modern challenges: –Data too “massive” to allow time |x| to process it. –Can we do much faster? –Allow “randomness” in algorithms. –Allow some “approximation error”.

MIT Computer Science & Artificial Intelligence Laboratory 19 Motivations Internet Traffic –Suppose we maintain vast amounts of logs of internet traffic through a router. –Was there a major shift in the nature of requests within the last hour (perhaps a denial of service attack). Disease Patterns –Suppose we have data for spread of a disease. –What are causal factors. … Theme: Data Abundant; Processing bottleneck

MIT Computer Science & Artificial Intelligence Laboratory 20 “Introverted Algorithms” New Area : Many Problems, Few Tools [P. Valiant]: Symmetric Approximation Properties of Distributions “Intrinsic properties” “Uniform a—m” = “Uniform n—z” yes ? no Distribution Space Invariant under renaming

MIT Computer Science & Artificial Intelligence Laboratory 21 “Introverted Algorithms” New Area : Many Problems, Few Tools [P. Valiant]: Symmetric Approximation Properties of Distributions yes ? no Distribution Space Reals α β “Intrinsic properties” “Uniform a—m” = “Uniform n—z” Invariant under renaming

MIT Computer Science & Artificial Intelligence Laboratory 22 “Introverted Algorithms” New Area : Many Problems, Few Tools [P. Valiant]: Symmetric Approximation Properties of Distributions yes ? no Distribution Space Reals α β continuous Includes: approximating Entropy, Statistical (L1) Distance, Support Size, Information Divergences, other L c distances, weighted distances … “Intrinsic properties” “Uniform a—m” = “Uniform n—z” Invariant under renaming

MIT Computer Science & Artificial Intelligence Laboratory 23 New Contribution Entropy Approximation: β? Statistical Distance: β? g u a c d g u e n α/β [BDKR ’02] n 2α/3β [RRSS ’07] n [B ’01] n 1/2 [BFRSW ’00] nα/βnα/β n Two Components of a Solution: An Upper Bound (Algorithm) A Lower Bound (Impossibility Proof) d g u e

MIT Computer Science & Artificial Intelligence Laboratory 24 New Contribution Entropy Approximation: β? Statistical Distance: β? nα/βnα/β n Canonical Tester Canonical Testing Theorem: Determining the sample complexity of property testing is now a question of algorithm analysis “If the Canonical Tester does not work, nothing does.” Both an upper and a lower bound —What’s the algorithm?

MIT Computer Science & Artificial Intelligence Laboratory 25 The Canonical Tester (a,b,b,a,a,a,f,e,e,e) yes no threshold: 3 estimate high frequencies constrain low frequencies ∩ {yes,no} “If the Canonical Tester does not work, nothing will” If the k-sample Canonical Tester with threshold O( ) does not correctly distinguish  β+ε, then no tester can distinguish  β-ε in k  /n o(1) samples. log n 22  is ( ,  )-weakly continuous: if |d 1 -d 2 |<  then |  (d 1 )-  (d 2 )|<  abcde… ….4 <.3.3  yes ? no 

MIT Computer Science & Artificial Intelligence Laboratory 26 Part IIIb: Robust Intelligent Communication

MIT Computer Science & Artificial Intelligence Laboratory 27 Intelligence and Interaction [Juba & S.] Typical communication “protocols” non-robust. –Depend on perfect understanding between sender and receiver. Require universal adoption of fixed standards. Is this essential? Why? –To reduce human oversight in critical tasks. –E.g., Cars that exchange information, hospitals exchanging medical records. –Heterogeneity leads to violation of “standards”. Technical issues: –Classical communication suppresses/fears intelligence of communicators. Need new models, methods to exploit intelligence of sender & receiver.

MIT Computer Science & Artificial Intelligence Laboratory 28 Modelling the Problem Alice wishes to send algorithm A to Bob –Both know programming; but do so in different languages. –Can she send him the algorithm? Theorem: Not possible to do this unambiguously. Implications: Perfect understanding impossible in evolving settings (when two communicators evolve).

MIT Computer Science & Artificial Intelligence Laboratory 29 Modelling the Problem Alice wishes to send algorithm A to Bob –Both know programming; but do so in different languages. –Can she send him the algorithm? Theorem [Juba & S.]: Not possible to do this unambiguously. Implications: Perfect understanding impossible in evolving settings (when two communicators evolve) – What should we do?

MIT Computer Science & Artificial Intelligence Laboratory 30 Communication & Goals Communication is not an end in itself, it is a means to some (selfish, verifiable) end. –Bob must be trying to use Alice to some benefit *E.g., to alter the environment (remote control) *To learn something (intellectual curiosity). Test Case: Bob (weak computer) tries to communicate with Alice (strong computer) to use her computational abilities. Theorem [Juba & S.]: Bob can use Alice’s help to solve his problem iff problem is verifiable (without common prior background).

MIT Computer Science & Artificial Intelligence Laboratory 31 Examples Bob uses Alice to determine which programs are viruses. –Undecidable problem. Bob can not verify. –Eventually he will make an error. Bob uses Alice to break cryptosystem. –He knows when he has broken in. Should do so. –In the process of doing so he learns Alice’s language (and realizes he is learning). Bob uses Alice to add integers. –Can verify – so he won’t make mistakes. –But probably won’t learn her language.

MIT Computer Science & Artificial Intelligence Laboratory 32 Implications Architecture for communicating computers: –Each interface should have a dedicated “interpreter” –Interpreter is constantly in mode of checking and adapting. Will future of communication look like this? –Answer in 20 years …

MIT Computer Science & Artificial Intelligence Laboratory 33 Recap … Why is Theory Important? Lessons learned from past are useful (theories more important than theorems). –Message of FoxConn Algorithms Course! Good insight into problems of the future. Occasionally … solutions useful today! –RSA, Akamai (CSAIL has more royalties from theory than all other sources put together)!

MIT Computer Science & Artificial Intelligence Laboratory 34 Thank You!

MIT Computer Science & Artificial Intelligence Laboratory 35 Property Testers yes ? no abcde… …  (a,b,b,a,a,a,f,e,e,e) (  10)  tester yes no  sampling (probability > ⅔

MIT Computer Science & Artificial Intelligence Laboratory 36 The Canonical Tester yes ? no abcde… …  (a,b,b,a,a,a,f,e,e,e) (  10)  tester yes no  sampling (probability > ⅔ threshold: 3 estimate high frequencies abcde… ….4 <.3.3 constrain low frequencies  ∩ {yes,no} yes ? no 