MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science...

34
MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL

Transcript of MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science...

Page 1: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

1

Research in Theoretical Computer Science

Madhu Sudan

CSAIL

Page 2: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

2

Overview

• Part I: Introduction to Theory of Computation.

• Part II: Perspective on (immediate) relevance.

• Part III: A current research direction.– Introverted Algorithms

– Communication with errors: Meaning of bits

Page 3: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

3

Part I: Introduction to Theory of CS

Page 4: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

4

Theory of Computing

• Mathematical study of Computation and its consequences.

• Computation: Sequence of simple steps, leading to complex change in information.

• Measures: Efficiency of algorithm/program: – Depends on hardware and implementation.

• Can ask how it scales?– If I double the hardware capacity (speed/memory)

* Will this increase the biggest size of problem I can solve by constant factor? (polynomial solution)

* Or by additive constant? (exponential solution)

Page 5: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

5

Theory of Computing

• Mathematical study of Computation and its consequences.

• Computation: Sequence of simple steps, leading to complex change in information.

• Issues: – Algorithms: Design efficient sequence of steps that

produce a desired effect. What is efficient?

– Complexity: When is inefficiency inherent?

– Implications: What effect does (in)efficiency have on human (intelligent) interaction?

• Surprisingly broad in scope and impact.

Page 6: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

6

Example: Integer Arithmetic

• Addition:

• Multiplication:

• Factoring:

2 3 1 5 6 7+ 5 8 9 1 4

18 14 8 10 4 8 19 0 4 8 12 9 0 4 8 1

Linear!

Page 7: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

7

1 3 6 4 2 5 3 8 2 3 8

Example: Integer Arithmetic

• Addition: Linear!

• Multiplication:

• Factoring?

2 3 1 5 6 7x 5 8 9 1 4

9 2 6 2 6 82 3 1 5 6 7

2 0 8 4 1 0 31 8 5 2 5 3 6

1 1 5 7 8 3 5

Quadratic! Fastest? Not Linear?

Page 8: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

8

• Addition: Linear!

• Multiplication: Quadratic! Fastest? Not-linear

• Factoring? Write 13642538238 as product of two integers (each less than 1000000)

• Inverse of above problem. – Not known to be linear/quadratic/cubic.

– Believed to require exponential time.

Example: Integer Arithmetic

Page 9: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

9

• Algorithms: Given a task (e.g., multiplication) find fast algorithms.– First algorithm we think of may not be fastest.

• Complexity: Prove lower bounds on resources required to solve problem.– Is multiplication harder than addition?

– Is factoring harder than multiplication?

• Implications: Cryptography …– Economics: Markets implement efficient computation.

– Biology: Nature implements efficient computation.

– Networks: Errors implement efficient computation.

Fundamental quests of CS Theory

Page 10: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

10

Long-range questions

• Is “P=NP?”– Formally, Is all computation reversible? (e.g.,

multiplication vs. factoring?)

– Philosophically, can every designer (mathematician, physicist, engineer, biologist) be replaced by a computer?

- (Most of us don’t expect this).

- Can we factor integers efficiently?- (Hopefully, still no).

- If not, can we build secure communication based on this?

- Led to RSA. Still many challenges today.

Page 11: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

11

Modern addenda to long-term quests

• Is the universe random?– Maybe … if so:

* Can build efficient algorithms this way (modern examples due to Karger, Rubinfeld, Indyk, Kelner)

* Can synchronize distributed systems (essential, as shown by Lynch et al.)

* Can generate and preserve secrets (essential, as shown by Goldwasser and Micali).

– Maybe not … if so

* Might still look random to us, because P ≠ NP. (Long history … Blum, Micali, Yao)

• Is the universe quantum? Factoring easy (Shor)

Page 12: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

12

Current quests in computation

• Algorithms for Massive data sets– How can we leverage the computational power of a

laptop, to understand data such as the WWWMain issue: Massive data – won’t fit in our storage.

– Factors in our favor:

* We can perform random sampling

* We don’t have to deliver “guaranteed answers”

– Many Results [Karger, Vempala, Rubinfeld, Indyk]

* Can tell if there’s a “trend change” [Rubinfeld et al.]

* Can tell if a signal has high-intensity in some frequency. [Indyk et al.]

– Underlying emphasis on Randomness.

Page 13: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

13

Part II: Perspective of theory

Page 14: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

14

History of theoretical CS

• 1930s: Turing – invented Turing machine.– Universality: One machine implements all algorithms.

– Why? To model thought/reasoning/logic

* theorems and proofs

– Became foundation of modern computers (von Neumann)

• 1960s: Non-trivial algorithms:– Peterson – BCH decoder

– Cooley-Tukey – FFT

– Dijkstra – shortest paths

• 1970s: NP-completeness, Cryptography, RSA.

• 1990s: Internet algorithms (Yahoo!, Akamai, Google).

Page 15: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

15

Theory vs. Practice

• Theoretical Perspective– Focus on Long-term time horizon; not very close attention to current

nature of:

* Hardware

* Domain-specific information

* Solution feasibility

• Why should you care (today?)– Lessons learned from past are useful (theories more important than

theorems).

– Good insight into problems of the future.

– Occasionally … solutions useful today!

Page 16: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

16

Part III: Recent ResearchProblems, Solutions

Page 17: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

17

Part IIIa: Introverted Algorithms

Page 18: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

18

Sublinear time algorithms[R. Rubinfeld, P. Valiant]

• Typical Algorithmic Tasks.– Given x, compute some f(x) in time |x|. Linear time!

• Modern challenges:– Data too “massive” to allow time |x| to process it.

– Can we do much faster?

– Allow “randomness” in algorithms.

– Allow some “approximation error”.

Page 19: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

19

Motivations

• Internet Traffic– Suppose we maintain vast amounts of logs of internet

traffic through a router.

– Was there a major shift in the nature of requests within the last hour (perhaps a denial of service attack).

• Disease Patterns– Suppose we have data for spread of a disease.

– What are causal factors.

• …

• Theme: Data Abundant; Processing bottleneck

Page 20: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

20

“Introverted Algorithms” New Area : Many Problems, Few Tools

[P. Valiant]:Symmetric Approximation Properties of Distributions

“Intrinsic properties”

“Uniform a—m” = “Uniform n—z”

yes

?

no

Distribution Space

Invariant under renaming

Page 21: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

21

“Introverted Algorithms” New Area : Many Problems, Few Tools

[P. Valiant]:Symmetric Approximation Properties of Distributions

yes

?

no

Distribution Space

Reals

α

β

“Intrinsic properties”

“Uniform a—m” = “Uniform n—z”

Invariant under renaming

Page 22: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

22

“Introverted Algorithms” New Area : Many Problems, Few Tools

[P. Valiant]:Symmetric Approximation Properties of Distributions

yes

?

no

Distribution Space

Reals

α

β

continuous

Includes: approximating Entropy, Statistical (L1) Distance, Support Size, Information Divergences, other Lc distances, weighted distances ||}||||,max{||

||||

ba

ba …Includes: approximating Entropy, Statistical (L1) Distance, Support Size, Information Divergences, other Lc distances, weighted distances

“Intrinsic properties”

“Uniform a—m” = “Uniform n—z”

Invariant under renaming

Page 23: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

23

New Contribution

Entropy Approximation: <α or >β?

Statistical Distance: <α or >β?

g

u

a

c

dg

u

e

nα/β [BDKR ’02]

n2α/3β [RRSS ’07]

n [B ’01]

n1/2 [BFRSW ’00]

nα/β nTwo Components of a Solution:

An Upper Bound (Algorithm)

A Lower Bound (Impossibility Proof)

dg

u

e

Page 24: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

24

New Contribution

Entropy Approximation: <α or >β?

Statistical Distance: <α or >β?

nα/β n

Canonical Tester

Canonical Testing Theorem:

Determining the sample complexity of property testing is now a question of algorithm analysis

“If the Canonical Tester does not work, nothing does.”Both an upper and a lower bound

—What’s the algorithm?

Page 25: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

25

The Canonical Tester

(a,b,b,a,a,a,f,e,e,e)yes

no

threshold: 3estimate high frequenciesconstrain low frequencies

∩ {yes,no}

“If the Canonical Tester does not work, nothing will”

If the k-sample Canonical Tester with threshold O( ) does not correctly distinguish <α-ε from >β+ε, then no tester can distinguish <α+ε from >β-ε in k/no(1) samples.

log n

2

is (,)-weakly continuous: if |d1-d2|< then |(d1)-(d2)|<

a b c d e …

….4 <.3 <.3 <.3 .3 yes

?

no

Page 26: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

26

Part IIIb: Robust Intelligent Communication

Page 27: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

27

Intelligence and Interaction [Juba & S.]

• Typical communication “protocols” non-robust.– Depend on perfect understanding between sender and

receiver. Require universal adoption of fixed standards. Is this essential?

• Why?– To reduce human oversight in critical tasks.

– E.g., Cars that exchange information, hospitals exchanging medical records.

– Heterogeneity leads to violation of “standards”.

• Technical issues: – Classical communication suppresses/fears intelligence

of communicators. Need new models, methods to exploit intelligence of sender & receiver.

Page 28: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

28

Modelling the Problem

• Alice wishes to send algorithm A to Bob – Both know programming; but do so in different

languages.

– Can she send him the algorithm?

• Theorem: Not possible to do this unambiguously.

• Implications: Perfect understanding impossible in evolving settings (when two communicators evolve).

Page 29: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

29

Modelling the Problem

• Alice wishes to send algorithm A to Bob – Both know programming; but do so in different

languages.

– Can she send him the algorithm?

• Theorem [Juba & S.]: Not possible to do this unambiguously.

• Implications: Perfect understanding impossible in evolving settings (when two communicators evolve)– What should we do?

Page 30: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

30

Communication & Goals

• Communication is not an end in itself, it is a means to some (selfish, verifiable) end.– Bob must be trying to use Alice to some benefit

* E.g., to alter the environment (remote control)

* To learn something (intellectual curiosity).

• Test Case: Bob (weak computer) tries to communicate with Alice (strong computer) to use her computational abilities.

• Theorem [Juba & S.]: Bob can use Alice’s help to solve his problem iff problem is verifiable (without common prior background).

Page 31: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

31

Examples• Bob uses Alice to determine which programs are

viruses.– Undecidable problem. Bob can not verify.

– Eventually he will make an error.

• Bob uses Alice to break cryptosystem.– He knows when he has broken in. Should do so.

– In the process of doing so he learns Alice’s language (and realizes he is learning).

• Bob uses Alice to add integers.– Can verify – so he won’t make mistakes.

– But probably won’t learn her language.

Page 32: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

32

Implications• Architecture for communicating computers:

– Each interface should have a dedicated “interpreter”

– Interpreter is constantly in mode of checking and adapting.

• Will future of communication look like this?– Answer in 20 years …

Page 33: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

33

Recap … Why is Theory Important?• Lessons learned from past are useful (theories

more important than theorems).– Message of FoxConn Algorithms Course!

• Good insight into problems of the future.

• Occasionally … solutions useful today!– RSA, Akamai (CSAIL has more royalties from

theory than all other sources put together)!

Page 34: MIT Computer Science & Artificial Intelligence Laboratory 1 Research in Theoretical Computer Science Madhu Sudan CSAIL.

MIT Computer Science & Artificial Intelligence Laboratory

34

Thank You!