skip to main content
10.1145/225298.225310acmconferencesArticle/Chapter ViewAbstractPublication PagescoltConference Proceedingsconference-collections
Article
Free Access

Learning with unreliable boundary queries

Authors Info & Claims
Published:05 July 1995Publication History
First page image

References

  1. 1.D. Angluin. Exact learning of p-DNF formulas with malicious membership queries. Technical Report YALEU/DCS/TR- 1020, Yale University Department of Computer Science, March 1994.Google ScholarGoogle Scholar
  2. 2.D. Angluin. Queries and concept learning. Machine Learning, 2(4):319-342, April 1988. Google ScholarGoogle ScholarCross RefCross Ref
  3. 3.D. Angluin and M. Kril~is. Learning with malicious membership queries and exceptions. In Proc. 7th Annu. ACM Workshop on Comput. Learning Theory, pages 57-66. ACM Press, New York, NY, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.D. Angluin and D. K. Slonim. Randomly fallible teachers: Learning monotone DNF with an incomplete membership oracle. Machine Learning, 14(1):7-26, January 1994. A preliminary version of this paper appeared in COLT '91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.E. Baum. Neural net algorithms that learn in polynomial time from examples and queries. IEEE Transactions on Neural Networks, 2:5-19, 1991.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.E. B. Baum. Polynomial time algorithms for learning neural nets. In Proc. 3rd Annu. Workshop on Com. put. Learning Theory, pages 258-272, San Mateo, CA, 1990. Morgan Kaufmann. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.A. Blum and R. L. Rivest. Training a 3-node neural net is NP-Complete. In Advances in Neural Information Processing Systems I, pages 494-501. Morgan Kaufmann, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.M. Frazier, S. Goldman, N. Mishra, and L. Pitt. Learning from a consistently ignorant teacher. In Proc. 7th Annu. ACM Workshop on Comput. Learning Theory, pages 328-339. ACM Press, New York, NY, 1994. To appear, J. of Comput. Syst. Sci. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.M. Frazier and L. Pitt. CLASSIC learning. In Proc. 7th Annu. ACM Workshop on Comput. Learning Theory, pages 23-34. ACM Press, New York, NY, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.S. Goldman and R, Sloan. Can PAC learning algorithms tolerate random noise? Technical Report WUCS-92- 25, Washington University Department of Computer Science, July 1992. To appear, Algorithmica.Google ScholarGoogle Scholar
  11. 11.S.A. Goldman, M. J. Kearns, and R. E. Schapire. Exact identification of circuits using fixed points of amplification functions. SIAM J. Comput., 22(4):705-726, August 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.S. A. Goldman and H. D. Mathias. Learning k-term DNF formulas with an incomplete membership oracle. In Proc. 5th Annu. Workshop on Comput. Learning Theory, pages 77-84. ACM Press, New York, NY, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.M. Kearns and M. Li. Learning in the presence of malicious errors. SIAM J. Comput., 22:807-837, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.M. J. Kearns and R. E. Schapire. Efficient distributionfree learning of probabilistic concepts. In Proc. of the 31st Symposium on the Foundations of Comp. Sci., pages 382-391. IEEE Computer Society Press, Los Alamitos, CA, 1990.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.Philip D. Laird. Learning from Good and Bad Data. Kluwer international series in engineering and computer science. Kluwer Academic Publishers, Boston, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.K.J. Lang and E.B. Baum. Query learning can work poorly when a human oracle is used. In Proceedings of International Joint Conference on Neural Networks, IEEE, 1992.Google ScholarGoogle Scholar
  17. 17.N. Littlestone. Redundant noisy attributes, attributeerrors, and linear threshold learning using Winnow. In Proc. 4th Annu. Workshop on Comput. Learning Theory, pages 147-156, San Mateo, CA, 1991. Morgan Kaufmann. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.Y. Sakakibara. On learning from queries and counterexamples in the presence of noise. Inform. Proc. Lett., 37(5):279-284, March 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.G. Shackelford and D. Volper. Learning k-DNF with noise in the attributes. In Proc. 1st Annu. Workshop on Comput. Learning Theory, pages 97-103, San Mateo, CA, 1988. Morgan Kaufmann. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.R. Sloan. Types of noise in data for concept learning. In Proc. lst Annu. Workshop on Comput. Learning Theory, pages 91-96, San Mateo, CA, 1988. Morgan Kaufmann. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.R. H. Sloan and G. Turtin. Learning with queries but incomplete information. In Proc. 7th Annu. A CM Workshop on Comput. Learning Theory, pages 237-245. ACM Press, New York, NY, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.L. G. Valiant. A theory of the learnable. Commun. A CM, 27(11): 1134-1142, November 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Learning with unreliable boundary queries

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      COLT '95: Proceedings of the eighth annual conference on Computational learning theory
      July 1995
      464 pages
      ISBN:0897917235
      DOI:10.1145/225298

      Copyright © 1995 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 July 1995

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate35of71submissions,49%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader