Learning with Limited Visibility

نویسنده

  • Eli Dichterman
چکیده

This paper surveys recent studies of learning problems in which the learner faces restrictions on the amount of information he can extract from each example he encounters. Our main framework for the analysis of such scenarios is the RFA (Restricted Focus of Attention) model. While being a natural reenement of the PAC learning model, some of the fundamental PAC-learning results and techniques fail in the RFA paradigm; learnability in the RFA model is no longer characterized by the VC dimension, and many PAC learning algorithms are not applicable in the RFA setting. Hence, the RFA formulation reeects the need for new techniques and tools to cope with some fundamental constraints of realistic learning problems. We also present some paradigms and algorithms that may serve as a rst step towards answering this need. Two main types of restrictions can be considered in the general RFA setting: In the more stringent one, called k-RFA, only k of the n attributes of each example are revealed to the learner, while in the more permissive one, called k-wRFA, the restriction is made on the size of each observation (k bits), and no restriction is made on how the observations are extracted from the examples. We show an information-theoretic characterization of RFA learnability upon which we build a general tool for proving hardness results. We then apply this and other new techniques for studying RFA learning to two particularly expressive function classes, k-decision-lists (k-DL) and k-TOP, the class of thresholds of parity functions in which each parity function takes at most k inputs. Among other results, we show a hardness result for k-RFA learnability of k-DL, k n?2. In sharp contrast, an (n ? 1)-RFA algorithm for learning (n ? 1)-DL is presented. Similarly, we prove that 1-DL is learnable if and only if at least half of the inputs are visible in each instance. In addition, we show that there is a uniform-distribution k-RFA learning algorithm for the class of k-DL. For k-TOP we show weak learnability by a k-RFA algorithm (with eecient time and sample complexity for constant k) and strong uniform-distribution k-RFA learnability of k-TOP with eecient sample complexity for constant k. Finally, by combining some of our k-DL and k-TOP results, we show that, unlike the PAC model, weak learning does not imply strong learning in the k-RFA model. We also show a general technique for composing eecient k-RFA algorithms, and …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Epileptic seizure detection based on The Limited Penetrable visibility graph algorithm and graph properties

Introduction: Epileptic seizure detection is a key step for both researchers and epilepsy specialists for epilepsy assessment due to the non-stationariness and chaos in the electroencephalogram (EEG) signals. Current research is directed toward the development of an efficient method for epilepsy or seizure detection based the limited penetrable visibility graph (LPVG) algorith...

متن کامل

Forms of Visibility and Intrusion in Learning

In this paper, we investigated the forms of visibility and intrusion present during learning and offer initial findings based on our observations at two secondary schools. We have identified that visibility and intrusion exists in various forms of interactions in learning and could have negative consequences in learning if they are left unmanaged. We propose the usage of interactive surface as ...

متن کامل

The Internet, Value Chain Visibility, and Learning

It is unquestioned that the growth of the Internet is a significant phenomenon. Not only is there an exponential growth in the exchange of goods and services over the Internet, the Internet has changed the way information can be accessed and used. This paper posits that the Internet has made a fundamental change in the nature of the information value chain. The Internet has changed the visibili...

متن کامل

Performance Issues with Post-Mortem Debugging

Cycle simulators, in-circuit emulators, and hardware accelerators have made it possible to rapidly model the functionality of large digital designs. But these techniques provide limited visibility of internal design nodes, making debugging hard. Simulators run slowly when all nodes are traced. Emulators provide full visibility only with limited depth, or with greatly reduced speed. This paper d...

متن کامل

Taming Adversarial Domain Transfer with Structural Constraints for Image Enhancement

The goal of this work is to clarify images of traffic scenes that are degraded by natural causes such as fog, rain and limited visibility during the night. For these applications, it is next to impossible to get pixel perfect pairs of the same scene, with and without the degrading conditions. This makes it unsuitable for conventional supervised learning approaches. It is however easy to collect...

متن کامل

The strategic value of supply chain visibility: increasing the ability to reconfigure

Received: 1 April 2009 Revised: 7 November 2009 2nd Revision: 5 December 2009 Accepted: 11 December 2009 Abstract To understand the role of supply chain visibility in creating strategic value, this study uses the dynamic capabilities view to uncover the nature of supply chain visibility. The study identifies four important constructs of supply chain visibility that are helpful in driving supply...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998