Jayadev Acharya, C. Canonne, Yuhan Liu, Ziteng Sun, Himanshu Tyagi
{"title":"信息约束下的交互推理","authors":"Jayadev Acharya, C. Canonne, Yuhan Liu, Ziteng Sun, Himanshu Tyagi","doi":"10.1109/ISIT45174.2021.9518069","DOIUrl":null,"url":null,"abstract":"We consider the problem of distributed estimation and testing of discrete distributions under local information constraints that include communication and privacy as special cases. Our main result is a unified method that establishes tight bounds for interactive protocols under both the constraints and both the problems. Our main technical contribution is an average information bound which connects learning and testing and handles correlations due to interactivity. While we establish that for learning and testing under both the constraints above, interactivity does not help, we also illustrate a natural family of “leaky query” local constraints under which interactive protocols strictly outperform the noninteractive ones for identity testing.","PeriodicalId":299118,"journal":{"name":"2021 IEEE International Symposium on Information Theory (ISIT)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Interactive Inference under Information Constraints\",\"authors\":\"Jayadev Acharya, C. Canonne, Yuhan Liu, Ziteng Sun, Himanshu Tyagi\",\"doi\":\"10.1109/ISIT45174.2021.9518069\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider the problem of distributed estimation and testing of discrete distributions under local information constraints that include communication and privacy as special cases. Our main result is a unified method that establishes tight bounds for interactive protocols under both the constraints and both the problems. Our main technical contribution is an average information bound which connects learning and testing and handles correlations due to interactivity. While we establish that for learning and testing under both the constraints above, interactivity does not help, we also illustrate a natural family of “leaky query” local constraints under which interactive protocols strictly outperform the noninteractive ones for identity testing.\",\"PeriodicalId\":299118,\"journal\":{\"name\":\"2021 IEEE International Symposium on Information Theory (ISIT)\",\"volume\":\"258 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Symposium on Information Theory (ISIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIT45174.2021.9518069\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Symposium on Information Theory (ISIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT45174.2021.9518069","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Interactive Inference under Information Constraints
We consider the problem of distributed estimation and testing of discrete distributions under local information constraints that include communication and privacy as special cases. Our main result is a unified method that establishes tight bounds for interactive protocols under both the constraints and both the problems. Our main technical contribution is an average information bound which connects learning and testing and handles correlations due to interactivity. While we establish that for learning and testing under both the constraints above, interactivity does not help, we also illustrate a natural family of “leaky query” local constraints under which interactive protocols strictly outperform the noninteractive ones for identity testing.