Skip to main content

Learning Large-Alphabet and Analog Circuits with Value Injection Queries

  • Conference paper
Learning Theory (COLT 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4539))

Included in the following conference series:

Abstract

We consider the problem of learning an acyclic discrete circuit with n wires, fan-in bounded by k and alphabet size s using value injection queries. For the class of transitively reduced circuits, we develop the Distinguishing Paths Algorithm, that learns such a circuit using (ns)O(k) value injection queries and time polynomial in the number of queries. We describe a generalization of the algorithm to the class of circuits with shortcut width bounded by b that uses (ns)O(k + b) value injection queries. Both algorithms use value injection queries that fix only O(kd) wires, where d is the depth of the target circuit. We give a reduction showing that without such restrictions on the topology of the circuit, the learning problem may be computationally intractable when s = n Θ(1), even for circuits of depth O(logn). We then apply our large-alphabet learning algorithms to the problem of approximate learning of analog circuits whose gate functions satisfy a Lipschitz condition. Finally, we consider models in which behavioral equivalence queries are also available, and extend and improve the learning algorithms of [5] to handle general classes of gates functions that are polynomial time learnable from counterexamples.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aho, A.V., Garey, M.R., Ullman, J.D.: The transitive reduction of a directed graph. SIAM J. Comput. 1, 131–137 (1972)

    Article  MATH  MathSciNet  Google Scholar 

  2. Akutsu, T., Kuhara, S., Maruyama, O., Miyano, S.: Identification of gene regulatory networks by strategic gene disruptions and gene overexpressions. In: SODA ’98: Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 695–702, Philadelphia, PA, USA, Society for Industrial and Applied Mathematics (1998)

    Google Scholar 

  3. Angluin, D., Frazier, M., Pitt, L.: Learning conjunctions of Horn clauses. Machine Learning 9, 147–164 (1992)

    Google Scholar 

  4. Angluin, D., Hellerstein, L., Karpinski, M.: Learning read-once formulas with queries. J. ACM 40, 185–210 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  5. Angluin, D., Aspnes, J., Chen, J., Wu, Y.: Learning a circuit by injecting values. In: Proceedings of the Thirty-Eighth Annual ACM Symposium on Theory of Computing, pp. 584–593. ACM Press, New York, USA (2006)

    Chapter  Google Scholar 

  6. Angluin, D., Kharitonov, M.: When won’t membership queries help? J. Comput. Syst. Sci. 50(2), 336–355 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  7. Bshouty, N.H.: Exact learning boolean functions via the monotone theory. Inf. Comput. 123(1), 146–153 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  8. Downey, R.G., Fellows, M.R.: Parameterized Complexity. Springer, Heidelberg (1999)

    Google Scholar 

  9. Ideker, T., Thorsson, V., Karp, R.: Discovery of regulatory interactions through perturbation: Inference and experimental design. In: Pacific Symposium on Biocomputing 5, 302–313 (2000)

    Google Scholar 

  10. Jackson, J.C.: An efficient membership-query algorithm for learning DNF with respect to the uniform distribution. J. Comput. Syst. Sci. 55(3), 414–440 (1997)

    Article  MATH  Google Scholar 

  11. Jackson, J.C., Klivans, A.R., Servedio, R.A.: Learnability beyond AC0. In: STOC ’02: Proceedings of the thirty-fourth annual ACM symposium on Theory of computing, pp. 776–784. ACM Press, New York, USA (2002)

    Chapter  Google Scholar 

  12. Kearns, M., Valiant, L.: Cryptographic limitations on learning boolean formulae and finite automata. J. ACM 41(1), 67–95 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  13. Kharitonov, M.: Cryptographic hardness of distribution-specific learning. In: STOC ’93: Proceedings of the twenty-fifth annual ACM symposium on Theory of computing, pp. 372–381. ACM Press, New York, USA (1993)

    Chapter  Google Scholar 

  14. Linial, N., Mansour, Y., Nisan, N.: Constant depth circuits, Fourier transform, and learnability. Journal of the ACM 40(3), 607–620 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  15. Niedermeier, R. (ed.): Invitation to Fixed-Parameter Algorithms. Oxford University Press, Oxford (2006)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Nader H. Bshouty Claudio Gentile

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Angluin, D., Aspnes, J., Chen, J., Reyzin, L. (2007). Learning Large-Alphabet and Analog Circuits with Value Injection Queries. In: Bshouty, N.H., Gentile, C. (eds) Learning Theory. COLT 2007. Lecture Notes in Computer Science(), vol 4539. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72927-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72927-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72925-9

  • Online ISBN: 978-3-540-72927-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics