Learning Large-Alphabet and Analog Circuits with Value Injection Queries

We consider the problem of learning an acyclic discrete circuit with n wires, fan-in bounded by k and alphabet size s using value injection queries. For the class of transitively reduced circuits, we develop the Distinguishing Paths Algorithm, that learns such a circuit using (ns)O(k) value injection queries and time polynomial in the number of queries. We describe a generalization of the algorithm to the class of circuits with shortcut width bounded by b that uses (ns)O(k+b) value injection queries. Both algorithms use value injection queries that fix only O(kd) wires, where d is the depth of the target circuit. We give a reduction showing that without such restrictions on the topology of the circuit, the learning problem may be computationally intractable when s = nΘ(1), even for circuits of depth O(log n). We then apply our large-alphabet learning algorithms to the problem of approximate learning of analog circuits whose gate functions satisfy a Lipschitz condition. Finally, we consider models in which behavioral equivalence queries are also available, and extend and improve the learning algorithms of [5] to handle general classes of gates functions that are polynomial time learnable from counterexamples.

[1]  Dana Angluin,et al.  When won't membership queries help? , 1991, STOC '91.

[2]  Nader H. Bshouty Exact Learning Boolean Function via the Monotone Theory , 1995, Inf. Comput..

[3]  Philip M. Morse,et al.  Methods of Mathematical Physics , 1947, The Mathematical Gazette.

[4]  Marek Karpinski,et al.  Learning read-once formulas with queries , 1993, JACM.

[5]  Wolfgang Maass,et al.  On the complexity of learning from counterexamples , 1989, 30th Annual Symposium on Foundations of Computer Science.

[6]  N. Littlestone Learning Quickly When Irrelevant Attributes Abound: A New Linear-Threshold Algorithm , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[7]  R. Courant,et al.  Methods of Mathematical Physics , 1962 .

[8]  Jeffrey C. Jackson An Efficient Membership-Query Algorithm for Learning DNF with Respect to the Uniform Distribution , 1997, J. Comput. Syst. Sci..

[9]  Rocco A. Servedio,et al.  Learnability beyond AC0 , 2002, STOC '02.

[10]  Michael R. Fellows,et al.  Parameterized Complexity , 1998 .

[11]  Satoru Miyano,et al.  Identification of gene regulatory networks by strategic gene disruptions and gene overexpressions , 1998, SODA '98.

[12]  Michael Kharitonov,et al.  Cryptographic hardness of distribution-specific learning , 1993, STOC.

[13]  Noga Alon,et al.  Color-coding , 1995, JACM.

[14]  James Aspnes,et al.  Learning a circuit by injecting values , 2006, STOC '06.

[15]  Satoru Miyano,et al.  Identification of genetic networks by strategic gene disruptions and gene overexpressions under a boolean model , 2003, Theor. Comput. Sci..

[16]  Leslie G. Valiant,et al.  Cryptographic limitations on learning Boolean formulae and finite automata , 1994, JACM.

[17]  M. Xiong,et al.  Identification of genetic networks. , 2004, Genetics.

[18]  Noam Nisan,et al.  Constant depth circuits, Fourier transform, and learnability , 1993, JACM.

[19]  V. Thorsson,et al.  Discovery of regulatory interactions through perturbation: inference and experimental design. , 1999, Pacific Symposium on Biocomputing. Pacific Symposium on Biocomputing.

[20]  Alfred V. Aho,et al.  The Transitive Reduction of a Directed Graph , 1972, SIAM J. Comput..

[21]  Michael Frazier,et al.  Learning conjunctions of Horn clauses , 2004, Machine Learning.

[22]  Rolf Niedermeier,et al.  Invitation to Fixed-Parameter Algorithms , 2006 .