We consider exact learning of concepts using two types of query: extended equivalence queries, and malicious membership queries, that is, membership queries that are permitted to make errors on some arbitrarily chosen set of examples of a bounded cardinality. We present a randomized algorithm to learn ¯-DNF formulas using these queries. The expected running time of the algorithm is polynomial in the number of variables and the maximum number of strings on which the membership oracle is allowed to make errors. 1 Introduction We continue the investigation begun by Angluin and Krikis [2] concerning the effects of errors in the answers to membership queries in the model of equivalence queries and malicious membership queries. We are interested...
AbstractA number of efficient learning algorithms achieve exact identification of an unknown functio...
We consider the problem of learning k-term DNF formulas using equivalence queries and incomplete mem...
AbstractWe investigate cryptographic limitations on the power of membership queries to help with con...
AbstractWe study the learning models defined in [D. Angluin, M. Krikis, R.H. Sloan, G. Turán, Malici...
AbstractA number of efficient learning algorithms achieve exact identification of an unknown functio...
AbstractWe study the learning models defined in [D. Angluin, M. Krikis, R.H. Sloan, G. Turán, Malici...
A central topic in query learning is to determine which classes of Boolean formulas are efficiently ...
. We consider the exact learnability of subclasses of Boolean formulas from membership queries alone...
We study the learning models defined in [D. Angluin, M. Krikis, R.H. Sloan, G. Turán, Malicious omis...
AbstractThis paper presents an algorithm that uses equivalence and membership queries to learn the c...
A number of efficient learning algorithms achieve exact identification of an unknown function from s...
AbstractWe show that the class of all circuits is exactly learnable in randomized expected polynomia...
AbstractA central topic in query learning is to determine which classes of Boolean formulas are effi...
We investigate the query complexity of exact learning in the membership and (proper) equivalence que...
AbstractWe introduce a combinatorial dimension that characterizes the number of queries needed to ex...
AbstractA number of efficient learning algorithms achieve exact identification of an unknown functio...
We consider the problem of learning k-term DNF formulas using equivalence queries and incomplete mem...
AbstractWe investigate cryptographic limitations on the power of membership queries to help with con...
AbstractWe study the learning models defined in [D. Angluin, M. Krikis, R.H. Sloan, G. Turán, Malici...
AbstractA number of efficient learning algorithms achieve exact identification of an unknown functio...
AbstractWe study the learning models defined in [D. Angluin, M. Krikis, R.H. Sloan, G. Turán, Malici...
A central topic in query learning is to determine which classes of Boolean formulas are efficiently ...
. We consider the exact learnability of subclasses of Boolean formulas from membership queries alone...
We study the learning models defined in [D. Angluin, M. Krikis, R.H. Sloan, G. Turán, Malicious omis...
AbstractThis paper presents an algorithm that uses equivalence and membership queries to learn the c...
A number of efficient learning algorithms achieve exact identification of an unknown function from s...
AbstractWe show that the class of all circuits is exactly learnable in randomized expected polynomia...
AbstractA central topic in query learning is to determine which classes of Boolean formulas are effi...
We investigate the query complexity of exact learning in the membership and (proper) equivalence que...
AbstractWe introduce a combinatorial dimension that characterizes the number of queries needed to ex...
AbstractA number of efficient learning algorithms achieve exact identification of an unknown functio...
We consider the problem of learning k-term DNF formulas using equivalence queries and incomplete mem...
AbstractWe investigate cryptographic limitations on the power of membership queries to help with con...