⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 http:^^www.lcs.mit.edu^web_project^brochure^toc^theory.html

📁 This data set contains WWW-pages collected from computer science departments of various universities
💻 HTML
📖 第 1 页 / 共 2 页
字号:
learning that provide better theoretical formulations ofreal-world learning situations and the appropriatealgorithms. One example is to learn a concept defined byBoolean formulae from examples of that concept. Another isto infer the structure of a finite-state system byexamining the system's input/output behavior. Statisticaltechniques are needed to determine how much data are neededfor a given problem; complexity theory helps assess thedifficulty of computing the desired answer from the data.<p>Machine-learning research is generally theoretical innature (although some is experimental), and involves thecareful specification of models of learning and the precisespecification and analysis of learning algorithms. We use awide range of models to capture different aspects oftechnical and philosophical relevance, such as learningfrom noisy data; learning hierarchically structuredconcepts; learning with neural nets; learning via differentoutput representations; learning to represent a systemcontaining hidden state variables, and trading offsimplicity of hypothesis with quality of fit to the data.<p><p><a name=crypt><center><table border><tr>	<td><!WA20><img hspace=6 src=http://www.lcs.mit.edu/web_project/Brochure/toc/goldwasser.gif></td>	<td width=100 rowspan=2><br></td>	<td><!WA21><img src=http://www.lcs.mit.edu/web_project/Brochure/toc/micali.gif></td>	</tr><tr><td> <!WA22><A HREF="http://theory.lcs.mit.edu/~shafi"><address><b>Shafrira Goldwasser</b></a>,<br>Professor of <br>Electrical Engineering<br> and  Computer Science<br>(Cryptographic Protocols)</address>	</td><td> <address><b>Silvio Micali</b></a>,<br>Professor of <br>Electrical Engineering <br> and  Computer Science<br>(Cryptographic Protocols)</address></td>	</tr></table></center><p><b>Cryptography</b> is another important area of researchwithin LCS. In its simplest and most ancient form,cryptography relates to secret communication. Cast in theframework of complexity theory, the sender, the recipient,and the adversary are computationally bounded machines. Anencryption system is deemed "secure" when it iscomputationally unfeasible for an adversary to obtaininformation from their encodings. Since proving non-triviallower bounds on the complexity of NP-complete problems isnot within the current state of the art, proof of securitymust show that any method for compromising security can betransformed into an efficient algorithm for a problem (suchas factoring integers) which is generally believed to beintractable.<p>Achieving privacy is only one area of cryptographyresearch. Another is the design of protocols forauthentication, certified electronic mail, and contractsigning between two or more mutually suspicious parties. Ingeneral, the goal is to perform an arbitrary distributedcomputation among many processors, each containing someportion of the input. Each processor is connected in anetwork such that no processor reveals any informationother than that which is intended.<p>Protocol research has led to a complexity theory of theamount of knowledge that must be released in order for oneprocessor to prove a fact to another processor -- thetheory of "zero-knowledge proofs." Generating pseudo-randomnumbers and functions is another important field.(Randomness is here defined with respect to a specificmodel of computation and a specific level of computationalresources.)<p>LCS researchers have contributed to virtually allcryptographic inventions of the past decade, including theinvention of the first public-key cryptosystem,probabilistic cryptosystems, and the invention ofzero-knowledge proofs.<p><p><a name=cc><center><table border><tr>	<td><!WA23><img src=http://www.lcs.mit.edu/web_project/Brochure/toc/sipser.gif></td>	<td width=100 rowspan=2><br></td>	<td><!WA24><img src=http://www.lcs.mit.edu/web_project/Brochure/toc/karchmer.gif></td>	</tr><tr><td> <address><b>Michael Sipser,</b><br>Professor of Applied Mathematics<br>(Computational Complexity Theory)</address>	</td><td> <address><b>Mauricio Karchmer</b>,<br>Assistant Professor of Mathematics<br>(Computational Complexity Theory)</address></td>	</tr></table></center><p>LCS also enjoys a traditional leadership role in<b>computation complexity theory</b>. One of the prime goalsin this field is to devise and study natural schemes forclassifying problems according to their computationaldifficulty, then place familiar and important problemswithin the appropriate scheme.<p>One familiar example is the problem of factoring largeintegers -- that is, finding all the prime numbers thatdivide the integer evenly. The exercise is not onlytheoretically interesting, but also is relevant tocryptography. The "brute force" method of searching forprime factors one by one is too slow to be useful. Whilebetter algorithms are known, determining the intrinsicdifficulty of the factoring problem is one of complexitytheory's many exciting questions.<p>LCS researchers were the first to show that there areproblems of high intrinsic complexity. Now we areinvestigating the complexity of problems akin to factoringby studying the power of weak computational models, such asbranching programs and monotone circuits of bounded depth.These formally constrained models are easier to analyze andthus may help us better understand the standard models. Inclosely related work, we are studying the power ofprobabilistic computation, parallelism, randomness andpseudo-randomness, interactive proof systems, and otherbasic computing concepts.<p><center><table border><tr>	<td><!WA25><img hspace=8 src=http://www.lcs.mit.edu/web_project/Brochure/toc/meyer.gif></td>	<td width=100 rowspan=2><br></td>	<td><!WA26><img src=http://www.lcs.mit.edu/web_project/Brochure/toc/elias.gif></td>	</tr><tr><td> <!WA27><A HREF="http://theory.lcs.mit.edu/~meyer"><address><b>Albert R. Meyer,</b></a><br>Hitachi America Professor <br>of Engineering<br>(Program Semantics and Logic)</address>	</td><td> <address><b>Peter Elias</b>,<br>Professor <b> Emeritus</b><br>and Senior Lecturer<br>(Information Theory)<address></td>	</tr></table></center><p>Elsewhere within LCS, researchers into the <a name=psem><b>theory ofprogramming semantics and logic</b> aim to provide clearmathematical foundations and reliable reasoning principlesthat conform to the robust functional metaphor programmersuse to design, describe, and justify their programs.Programming routinely unites high abstraction and pragmaticdesign and includes the declaration of procedures,functions, data types, processes, and "objects." Theresearchers' objective is to lay a solid foundation forthis task.<p>Computer scientists' notion of a "function," however, maydepend on when and in what context it is evaluated. Thatcontrasts with the mathematician's classical notion of afunction. Bridging this conceptual gap involves elements ofalgebra, modal and intuitionistic logic, and category-,complexity-, computability-, proof-, and type theory -- allapplied to programming-language design, compilerconstruction, and program optimization. This work is beingextended to the study of specifying the meaning andverification of the properties of parallel and distributedprocesses.<p><center><table border><tr>	<td><!WA28><img src=http://www.lcs.mit.edu/web_project/Brochure/toc/lynch.gif></td>	<td width=100 rowspan=2><br></td>	<td><!WA29><img src=http://www.lcs.mit.edu/web_project/Brochure/toc/awerbuch.gif></td>	</tr><tr><td><!WA30><A HREF="http://theory.lcs.mit.edu/~lynch"><address><b>Nancy Lynch,</b></a><br>Professor of Electrical Engineering <br>and Computer Science<br>(Distributed Computing)</address>	</td><td> <address><b>Baruch Awerbuch</b>,<br>Research Scientist<br>(Distributed Computing)</address></td>	</tr></table></center><p><!WA31><a name=tds><A HREF="http://theory.lcs.mit.edu/tds">Distributed computation theory</a> is designed to clarifythe basic capabilities and limitations of concurrent anddistributed computing systems. Research results include newalgorithms and their analysis, impossibility results,formal concurrent-systems models, and models and techniquesfor proving correctness of concurrent algorithms. Problemstypically include getting the non-failing processors toagree, synchronizing non-failing processors, fault-tolerantcompiling and routing, resource allocation, sharing accessto data, and graph-theoretic problems such as doing abreadth-first search or finding minimum-cost spanningtrees.<p>A basic problem in fault-tolerant computing is to causeprocessors to agree among themselves (about the value of adata item, say, or about a common course of action). Whilethis is a simple exercise in the absence of faults, it maybe impossible when faults are present: Individualprocessors do not have reliable knowledge about the statesof other processors. Our work has led to many interestingalgorithms and impossibility results that demonstrateconditions under which consensus can or cannot be achieved.<p>An important LCS project related to network protocols hasbeen the development of a series of efficient algorithmictransformers. The result of this project is the"compilation" of protocols that were designed for arelatively simple network model into protocols that run ina more complex, but more realistic, environment.<p>LCS has developed an important formalism -- theInput/Output Automaton Model, a basic mathematical modelfor concurrent and distributed systems and theircomponents. This simple-state machine model helps describeinteractions between a concurrent system and itsenvironment. The model not only verifies the correctness ofalgorithms but also helps find and fix serious gaps in somebasic existing algorithms -- the construction ofmulti-writer atomic registers, for example.</BODY><p><!WA32><a href="http://www.lcs.mit.edu/web_project/Brochure/contents.html"><!WA33><img align=left src=http://www.lcs.mit.edu/web_project/Brochure/icons/contents_motif.gif></a><!WA34><a href="http://www.lcs.mit.edu/web_project/Brochure/sct/sct.html"><!WA35><img align=left src=http://www.lcs.mit.edu/web_project/Brochure/icons/previous_group_motif.gif></a><!WA36><a href="http://www.lcs.mit.edu/web_project/Brochure/hq/hq.html"><!WA37><img align=left src=http://www.lcs.mit.edu/web_project/Brochure/icons/next_motif.gif></a></HTML>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -