Interactive Clustering of Linear Classes and Cryptographic Lower Bounds
نویسندگان
چکیده
We study an interactive model of supervised clustering introduced by Balcan and Blum [7], where the clustering algorithm has query access to a teacher. We give an efficient algorithm clustering linear functionals over finite fields, which implies the learnability of parity functions in this model. We also present an efficient clustering algorithm for hyperplanes which are a natural generalization of the problem of clustering linear functionals over R. We also give cryptographic hardness results for interactive clustering. In particular, we show that, under plausible cryptographic assumptions, the interactive clustering problem is intractable for the concept classes of polynomial-size constant-depth threshold circuits, Boolean formulas, and finite automata.
منابع مشابه
Multi-linear Secret-Sharing Schemes
Multi-linear secret-sharing schemes are the most common secret-sharing schemes. In these schemes the secret is composed of some field elements and the sharing is done by applying some fixed linear mapping on the field elements of the secret and some randomly chosen field elements. If the secret contains one field element, then the scheme is called linear. The importance of multi-linear schemes ...
متن کاملOn a linear combination of classes of harmonic $p-$valent functions defined by certain modified operator
In this paper we obtain coefficient characterization, extreme points and distortion bounds for the classes of harmonic $p-$valent functions defined by certain modified operator. Some of our results improve and generalize previously known results.
متن کاملFinding Collisions in Interactive Protocols - Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments
We study the round and communication complexities of various cryptographic protocols. We give tight lower bounds on the round and communication complexities of any fully black-box reduction of a statistically hiding commitment scheme from one-way permutations, and from trapdoor permutations. As a corollary, we derive similar tight lower bounds for several other cryptographic protocols, such as ...
متن کاملUpper and lower bounds of symmetric division deg index
Symmetric Division Deg index is one of the 148 discrete Adriatic indices that showed good predictive properties on the testing sets provided by International Academy of Mathematical Chemistry. Symmetric Division Deg index is defined by $$ SDD(G) = sumE left( frac{min{d_u,d_v}}{max{d_u,d_v}} + frac{max{d_u,d_v}}{min{d_u,d_v}} right), $$ where $d_i$ is the degree of vertex $i$ in graph $G$. In th...
متن کاملAn interactive weighted fuzzy goal programming technique to solve multi-objective reliability optimization problem
This paper presents an application of interactive fuzzy goal programming to the nonlinear multi-objective reliability optimization problem considering system reliability and cost of the system as objective functions. As the decision maker always have an intention to produce highly reliable system with minimum cost, therefore, we introduce the interactive method to design a high productivity sys...
متن کامل