preliminaries: Kolmogorov complexity U(p) = T i (p) K(x) = min p { p - - PowerPoint PPT Presentation

preliminaries kolmogorov complexity
SMART_READER_LITE
LIVE PREVIEW

preliminaries: Kolmogorov complexity U(p) = T i (p) K(x) = min p { p - - PowerPoint PPT Presentation

A safe & computable approximation to Kolmogorov complexity Peter Bloem, Francisco Mota, Steven de Rooij, Lus Antunes & Pieter Adriaans preliminaries: Kolmogorov complexity U(p) = T i (p) K(x) = min p { p : U(p) = x }


slide-1
SLIDE 1

A safe & computable approximation to Kolmogorov complexity

Peter Bloem, Francisco Mota, Steven de Rooij, Luìs Antunes & Pieter Adriaans

slide-2
SLIDE 2

preliminaries: Kolmogorov complexity

U(ıp) = Ti(p) K(x) = minp { p : U(p) = x }

slide-3
SLIDE 3

preliminaries: Kolmogorov complexity

U(ıp) = Ti(p) K(x) = minp { p : U(p) = x }

ӫ U is a formalisation of the notion of a description ӫ K is invariant to the choice of U (up to a constant)

slide-4
SLIDE 4

preliminaries: Kolmogorov complexity

U(ıp) = Ti(p) K(x) = minp { p : U(p) = x }

ӫ U is a formalisation of the notion of a description ӫ K is invariant to the choice of U (up to a constant)

slide-5
SLIDE 5

preliminaries: Kolmogorov complexity

U(ıp) = Ti(p) K(x) = minp { p : U(p) = x }

ӫ U is a formalisation of the notion of a description ӫ K is invariant to the choice of U (up to a constant)

slide-6
SLIDE 6

motivation “Kolmogorov is not computable, it’s only of theoretical use” No, approximations are usually correct

slide-7
SLIDE 7

preliminaries: Probabilities & codes ӫ L(x): (prefjx) code length function ӫ p(x): probability (semi) measure

  • log p(x) = L(x)
slide-8
SLIDE 8

step 1: computable probabilities From TMs to probabilities: T(p) = x pT(x) = Σp:T(p) = x 2-|p| m(x) = pU(x) equivalent to the lower semicomputable semimeasures

slide-9
SLIDE 9

step 2: model classes A model class C is an effectively enumerable subset of all Turing machines. UC(ıp) = Ti(p) KC(x) = minp { p : UC(p) = x } mC(x) = Σp:UC(p) = x 2-|p|

slide-10
SLIDE 10

step 3: safe approximation ӫ L(x): approximating code-length function ӫ L(x) is safe against p when p(L(x) - K(x) ≥ k) ≤ cb-k for some c and b > 1

slide-11
SLIDE 11

Is KC safe against p∈C?

slide-12
SLIDE 12

no.

slide-13
SLIDE 13

x x x x x x x x not x

slide-14
SLIDE 14

x x x x x x x x not x

  • log mC(x)

KC(x)

slide-15
SLIDE 15

Is -log mC safe against p∈C?

slide-16
SLIDE 16

yes.

slide-17
SLIDE 17
  • log mC is safe against mC

mC − log mC(x) − K(x) k

  • = mC

mC(x) 2−k2−K(x) =

  • x:mC(x)2−k2−K(x) mC(x)
  • 2−k2−K(x)

= 2−k 2−K(x) 2−k

slide-18
SLIDE 18
  • log mC is safe against mC

mC − log mC(x) − K(x) k

  • = mC

mC(x) 2−k2−K(x) =

  • x:mC(x)2−k2−K(x) mC(x)
  • 2−k2−K(x)

= 2−k 2−K(x) 2−k

slide-19
SLIDE 19
  • log mC is safe against mC

mC − log mC(x) − K(x) k

  • = mC

mC(x) 2−k2−K(x) =

  • x:mC(x)2−k2−K(x) mC(x)
  • 2−k2−K(x)

= 2−k 2−K(x) 2−k

slide-20
SLIDE 20
  • log mC is safe against mC

mC − log mC(x) − K(x) k

  • = mC

mC(x) 2−k2−K(x) =

  • x:mC(x)2−k2−K(x) mC(x)
  • 2−k2−K(x)

= 2−k 2−K(x) 2−k

slide-21
SLIDE 21
  • log mC is safe against mC

mC − log mC(x) − K(x) k

  • = mC

mC(x) 2−k2−K(x) =

  • x:mC(x)2−k2−K(x) mC(x)
  • 2−k2−K(x)

= 2−k 2−K(x) 2−k

slide-22
SLIDE 22
  • log mC is safe against mC

mC − log mC(x) − K(x) k

  • = mC

mC(x) 2−k2−K(x) =

  • x:mC(x)2−k2−K(x) mC(x)
  • 2−k2−K(x)

= 2−k 2−K(x) 2−k

slide-23
SLIDE 23
  • log mC is safe against members of C

mC(·) =

  • q∈C

cqpq(·) cqpq(·) cqpq

  • − log mC(x) − K(x) k
  • mC

− log mC(x) − K(x) k

  • 2−k
slide-24
SLIDE 24
  • log mC is safe against members of C

mC(·) =

  • q∈C

cqpq(·) cqpq(·) cqpq

  • − log mC(x) − K(x) k
  • mC

− log mC(x) − K(x) k

  • 2−k
slide-25
SLIDE 25
  • log mC is safe against members of C

mC(·) =

  • q∈C

cqpq(·) cqpq(·) cqpq

  • − log mC(x) − K(x) k
  • mC

− log mC(x) − K(x) k

  • 2−k
slide-26
SLIDE 26
  • log mC is safe against members of C

mC(·) =

  • q∈C

cqpq(·) cqpq(·) cqpq

  • − log mC(x) − K(x) k
  • mC

− log mC(x) − K(x) k

  • 2−k
slide-27
SLIDE 27

can we compute mC? ӫ We can if it’s upper and lower semicomputable ӫ lower: dovetail all programs for UC ӫ upper: dovetail until (1-s)/sx ≤ 2c − 1 ӫ If C is complete, this algorithm is com- putable

slide-28
SLIDE 28

KC(x) κC(x) =

  • log mC(x)

κC(x) =

  • log mC(x)
  • log m(x)

K(x)

dominates unsafe bounds 2-safe dominates bounds bounds dominates dominates

slide-29
SLIDE 29

What does this buy us? ӫ bridge between the practical and the platonic ӫ Bayesian ↔ MDL ↔ Algorithmic ӫ corollary: Kt ӫ Additional results: ID, NID

slide-30
SLIDE 30

Questions?