850 research outputs found
Chaining Mutual Information and Tightening Generalization Bounds
Bounding the generalization error of learning algorithms has a long history,
which yet falls short in explaining various generalization successes including
those of deep learning. Two important difficulties are (i) exploiting the
dependencies between the hypotheses, (ii) exploiting the dependence between the
algorithm's input and output. Progress on the first point was made with the
chaining method, originating from the work of Kolmogorov, and used in the
VC-dimension bound. More recently, progress on the second point was made with
the mutual information method by Russo and Zou '15. Yet, these two methods are
currently disjoint. In this paper, we introduce a technique to combine the
chaining and mutual information methods, to obtain a generalization bound that
is both algorithm-dependent and that exploits the dependencies between the
hypotheses. We provide an example in which our bound significantly outperforms
both the chaining and the mutual information bounds. As a corollary, we tighten
Dudley's inequality when the learning algorithm chooses its output from a small
subset of hypotheses with high probability.Comment: 20 pages, 1 figure; published at the NeurIPS 2018 conferenc
Polar Coding for Secret-Key Generation
Practical implementations of secret-key generation are often based on
sequential strategies, which handle reliability and secrecy in two successive
steps, called reconciliation and privacy amplification. In this paper, we
propose an alternative approach based on polar codes that jointly deals with
reliability and secrecy. Specifically, we propose secret-key capacity-achieving
polar coding schemes for the following models: (i) the degraded binary
memoryless source (DBMS) model with rate-unlimited public communication, (ii)
the DBMS model with one-way rate-limited public communication, (iii) the 1-to-m
broadcast model and (iv) the Markov tree model with uniform marginals. For
models (i) and (ii) our coding schemes remain valid for non-degraded sources,
although they may not achieve the secret-key capacity. For models (i), (ii) and
(iii), our schemes rely on pre-shared secret seed of negligible rate; however,
we provide special cases of these models for which no seed is required.
Finally, we show an application of our results to secrecy and privacy for
biometric systems. We thus provide the first examples of low-complexity
secret-key capacity-achieving schemes that are able to handle vector
quantization for model (ii), or multiterminal communication for models (iii)
and (iv).Comment: 26 pages, 9 figures, accepted to IEEE Transactions on Information
Theory; parts of the results were presented at the 2013 IEEE Information
Theory Worksho
Why Health Lawyers Must Be Public-Law Lawyers: Health Law In the Age of the Modern Regulatory State
Health law is not often framed as part of the public-law landscape, and my goal is to explain why it should be. My aim is to convince the next generation of health lawyers, policymakers, and health-law scholars that they must see health law as a field that is intimately related to Congress, federal statutes, federal agencies, and federalism, in order to have an impact on it. I will then apply this public-law framework to some current events involving the 2010 health reform statute-the Affordable Care Act ( ACA )-to illustrate how shaping health law today requires an understanding of the central roles now played in the field by the quintessential players in the public-law domain: Congress, federal agencies, the states, and the federal courts
Nationalism as the New Federalism (and Federalism as the New Nationalism): Complementary Account (and Some Challenges) to the Nationalist School
The Ripple Effect of Leg-Reg on the Study of Legislation and Adminstrative Law in the Law School Curriculum
- …
