Compatibility among diversity Foundations, lessons, and directions of semantic communication

We give an overview of a theory of semantic communication proposed by Goldreich, Juba, and Sudan. The theory is intended to capture the obstacles that arise when a diverse population of independently designed devices must communicate with one another. The aim of the theory is to provide conceptual foundations for the design and evaluation of devices that are compatible with such a diverse population. Conclusions drawn from the theory (i) identify a kind of information-sensing that is inherently necessary for compatibility whenever the population is sufficiently diverse and (ii) identify tensions between the richness of diversity and the computational cost of coping with such diversity in a population. We will review how these considerations are reflected in the formulation and design of an example application, a self-patching packet network stack. In particular, this application will illustrate the utility of explicit consideration of various computational complexity measures in addressing both (i) and (ii). We will also review work aimed at identifying kinds of populations across which compatibility can be achieved efficiently.

[1]  N. Littlestone Learning Quickly When Irrelevant Attributes Abound: A New Linear-Threshold Algorithm , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[2]  Madhu Sudan,et al.  Efficient Semantic Communication via Compatible Beliefs , 2011, ICS.

[3]  Santosh S. Vempala,et al.  Semantic Communication for Simple Goals Is Equivalent to On-line Learning , 2011, ALT.

[4]  Julie A. McCann,et al.  A survey of autonomic computing—degrees, models, and applications , 2008, CSUR.

[5]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[6]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[7]  Peter Auer,et al.  The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..

[8]  Claude E. Shannon,et al.  Recent Contributions to The Mathematical Theory of Communication , 2009 .

[9]  Brendan Juba,et al.  Learning implicitly in reasoning in PAC-Semantics , 2012, ArXiv.

[10]  F. MacWilliams,et al.  Codes which detect deception , 1974 .

[11]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[12]  Brendan A. Juba,et al.  Universal semantic communication I , 2008, Electron. Colloquium Comput. Complex..

[13]  Leslie G. Valiant,et al.  Robust logics , 1999, STOC '99.

[14]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[15]  Oded Goldreich,et al.  A theory of goal-oriented communication , 2012, JACM.