[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3219166.3219194acmconferencesArticle/Chapter ViewAbstractPublication PagesecConference Proceedingsconference-collections
research-article
Public Access

Water from Two Rocks: Maximizing the Mutual Information

Published: 11 June 2018 Publication History

Abstract

We build a natural connection between the learning problem, co-training, and forecast elicitation without verification (related to peer-prediction) and address them simultaneously using the same information theoretic approach. In co-training/multiview learning, the goal is to aggregate two views of data into a prediction for a latent label. We show how to optimally combine two views of data by reducing the problem to an optimization problem. Our work gives a unified and rigorous approach to the general setting. In forecast elicitation without verification we seek to design a mechanism that elicits high quality forecasts from agents in the setting where the mechanism does not have access to the ground truth. By assuming the agents' information is independent conditioning on the outcome, we propose mechanisms where truth-telling is a strict equilibrium for both the single-task and multi-task settings. Our multi-task mechanism additionally has the property that the truth-telling equilibrium pays better than any other strategy profile and strictly better than any other "non-permutation" strategy profile.

Supplementary Material

MP4 File (p177.mp4)

References

[1]
Arpit Agarwal and Shivani Agarwal. 2015. On consistent surrogate risk minimization and property elicitation Conference on Learning Theory. 4--22.
[2]
Syed Mumtaz Ali and Samuel D Silvey. 1966. A general class of coefficients of divergence of one distribution from another. Journal of the Royal Statistical Society. Series B (Methodological) (1966), 131--142.
[3]
Suzanna Becker. 1996. Mutual information maximization: models of cortical self-organization. Network: Computation in neural systems Vol. 7, 1 (1996), 7--31.
[4]
Anthony J Bell and Terrence J Sejnowski. 1995. An information-maximization approach to blind separation and blind deconvolution. Neural computation Vol. 7, 6 (1995), 1129--1159.
[5]
Avrim Blum and Tom Mitchell. 1998. Combining labeled and unlabeled data with co-training Proceedings of the eleventh annual conference on Computational learning theory. ACM, 92--100.
[6]
J-F Cardoso. 1997. Infomax and maximum likelihood for blind source separation. IEEE Signal processing letters Vol. 4, 4 (1997), 112--114.
[7]
Michael Collins and Yoram Singer. 1999. Unsupervised models for named entity classification 1999 Joint SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora.
[8]
Thomas M Cover and Joy A Thomas. 2006. Elements of information theory 2nd edition. (2006).
[9]
Imre Csiszár, Paul C Shields, et almbox. 2004. Information theory and statistics: A tutorial. Foundations and Trends® in Communications and Information Theory Vol. 1, 4 (2004), 417--528.
[10]
Anirban Dasgupta and Arpita Ghosh. 2013. Crowdsourced judgement elicitation with endogenous proficiency Proceedings of the 22nd international conference on World Wide Web. 319--330.
[11]
Sanjoy Dasgupta, Michael L Littman, and David A McAllester. 2002. PAC generalization bounds for co-training. In Advances in neural information processing systems. 375--382.
[12]
A. Gao, J. R. Wright, and K. Leyton-Brown. 2016. Incentivizing Evaluation via Limited Access to Ground Truth: Peer-Prediction Makes Things Worse. ArXiv e-prints (June. 2016). {arxiv}cs.GT/1606.07042
[13]
Tilmann Gneiting and Adrian E Raftery. 2007. Strictly proper scoring rules, prediction, and estimation. J. Amer. Statist. Assoc. Vol. 102, 477 (2007), 359--378.
[14]
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680.
[15]
Sham M Kakade and Dean P Foster. 2007. Multi-view regression via canonical correlation analysis International Conference on Computational Learning Theory. Springer, 82--96.
[16]
Roni Khardon and Gabriel Wachman. 2007. Noise tolerant variants of the perceptron algorithm. Journal of Machine Learning Research Vol. 8, Feb (2007), 227--248.
[17]
Y. Kong and G. Schoenebeck. 2016. An Information Theoretic Framework For Designing Information Elicitation Mechanisms That Reward Truth-telling. ArXiv e-prints (May. 2016). {arxiv}cs.GT/1605.01021
[18]
Y. Kong and G. Schoenebeck. 2018. Eliciting Expertise without Verification. ArXiv e-prints (Feb. 2018). {arxiv}cs.GT/1802.08312
[19]
Yingming Li, Ming Yang, and Zhongfei Zhang. 2016. Multi-view representation learning: A survey from shallow methods to deep methods. arXiv preprint arXiv:1610.01206 (2016).
[20]
Yang Liu and Yiling Chen. 2017. Machine-Learning Aided Peer Prediction. In Proceedings of the 2017 ACM Conference on Economics and Computation (EC '17). ACM, New York, NY, USA, 63--80.
[21]
Yang Liu and Yiling Chen. 2018. Surrogate Scoring Rules and a Dominant Truth Serum for Information Elicitation. CoRR Vol. abs/1802.09158 (2018). {arxiv}1802.09158 http://arxiv.org/abs/1802.09158
[22]
D. McAllester. 2018. Information Theoretic Co-Training. ArXiv e-prints (Feb. 2018). {arxiv}cs.LG/1802.07572
[23]
N. Miller, P. Resnick, and R. Zeckhauser. 2005. Eliciting informative feedback: The peer-prediction method. Management Science (2005), 1359--1373.
[24]
Nagarajan Natarajan, Inderjit S Dhillon, Pradeep K Ravikumar, and Ambuj Tewari. 2013. Learning with noisy labels. In Advances in neural information processing systems. 1196--1204.
[25]
XuanLong Nguyen, Martin J Wainwright, and Michael I Jordan. 2009. On surrogate loss functions and f-divergences. The Annals of Statistics (2009), 876--904.
[26]
XuanLong Nguyen, Martin J Wainwright, and Michael I Jordan. 2010. Estimating divergence functionals and the likelihood ratio by convex risk minimization. IEEE Transactions on Information Theory Vol. 56, 11 (2010), 5847--5861.
[27]
Sebastian Nowozin, Botond Cseke, and Ryota Tomioka. 2016. f-gan: Training generative neural samplers using variational divergence minimization Advances in Neural Information Processing Systems. 271--279.
[28]
D. Prelec. 2004. A Bayesian Truth Serum for subjective data. Science Vol. 306, 5695 (2004), 462--466.
[29]
Alexander J Ratner, Christopher M De Sa, Sen Wu, Daniel Selsam, and Christopher Ré. 2016. Data programming: Creating large training sets, quickly Advances in Neural Information Processing Systems. 3567--3575.
[30]
Vikas C Raykar, Shipeng Yu, Linda H Zhao, Gerardo Hermosillo Valadez, Charles Florin, Luca Bogoni, and Linda Moy. 2010. Learning from crowds. Journal of Machine Learning Research Vol. 11, Apr (2010), 1297--1322.
[31]
R Tyrrell Rockafellar et almbox. 1966. Extension of Fenchel'duality theorem for convex functions. Duke mathematical journal Vol. 33, 1 (1966), 81--89.
[32]
Clayton Scott, Gilles Blanchard, and Gregory Handy. 2013. Classification with asymmetric label noise: Consistency and maximal denoising Conference On Learning Theory. 489--511.
[33]
Victor Shnayder, Arpit Agarwal, Rafael Frongillo, and David C Parkes. 2016. Informed truthfulness in multi-task peer prediction Proceedings of the 2016 ACM Conference on Economics and Computation. ACM, 179--196.
[34]
Sainbayar Sukhbaatar and Rob Fergus. 2014. Learning from noisy labels with deep neural networks. arXiv preprint arXiv:1406.2080 Vol. 2, 3 (2014), 4.
[35]
Robert L Winkler. 1969. Scoring rules and the evaluation of probability assessors. J. Amer. Statist. Assoc. Vol. 64, 327 (1969), 1073--1078.
[36]
Jens Witkowski, Pavel Atanasov, Lyle H Ungar, and Andreas Krause. 2017. Proper Proxy Scoring Rules. In AAAI. 743--749.
[37]
Chang Xu, Dacheng Tao, and Chao Xu. 2013. A survey on multi-view learning. arXiv preprint arXiv:1304.5634 (2013).
[38]
Yuchen Zhang, Xi Chen, Denny Zhou, and Michael I Jordan. 2014. Spectral methods meet EM: A provably optimal algorithm for crowdsourcing Advances in neural information processing systems. 1260--1268.

Cited By

View all
  • (2024)Dominantly Truthful Peer Prediction Mechanisms with a Finite Number of TasksJournal of the ACM10.1145/363823971:2(1-49)Online publication date: 10-Apr-2024
  • (2024)Spot Check Equivalence: An Interpretable Metric for Information Elicitation MechanismsProceedings of the ACM Web Conference 202410.1145/3589334.3645679(276-287)Online publication date: 13-May-2024
  • (2024)On Truthful Item-Acquiring Mechanisms for Reward MaximizationProceedings of the ACM Web Conference 202410.1145/3589334.3645345(25-35)Online publication date: 13-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
EC '18: Proceedings of the 2018 ACM Conference on Economics and Computation
June 2018
713 pages
ISBN:9781450358293
DOI:10.1145/3219166
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 June 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. co-training
  2. information theory
  3. peer prediction

Qualifiers

  • Research-article

Funding Sources

Conference

EC '18
Sponsor:

Acceptance Rates

EC '18 Paper Acceptance Rate 70 of 269 submissions, 26%;
Overall Acceptance Rate 664 of 2,389 submissions, 28%

Upcoming Conference

EC '25
The 25th ACM Conference on Economics and Computation
July 7 - 11, 2025
Stanford , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)141
  • Downloads (Last 6 weeks)12
Reflects downloads up to 22 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Dominantly Truthful Peer Prediction Mechanisms with a Finite Number of TasksJournal of the ACM10.1145/363823971:2(1-49)Online publication date: 10-Apr-2024
  • (2024)Spot Check Equivalence: An Interpretable Metric for Information Elicitation MechanismsProceedings of the ACM Web Conference 202410.1145/3589334.3645679(276-287)Online publication date: 13-May-2024
  • (2024)On Truthful Item-Acquiring Mechanisms for Reward MaximizationProceedings of the ACM Web Conference 202410.1145/3589334.3645345(25-35)Online publication date: 13-May-2024
  • (2023)Game-theoretic mechanisms for eliciting accurate informationProceedings of the Thirty-Second International Joint Conference on Artificial Intelligence10.24963/ijcai.2023/740(6601-6609)Online publication date: 19-Aug-2023
  • (2023)Two Strongly Truthful Mechanisms for Three Heterogeneous Agents Answering One QuestionACM Transactions on Economics and Computation10.1145/356556010:4(1-26)Online publication date: 21-Feb-2023
  • (2023)Surrogate Scoring RulesACM Transactions on Economics and Computation10.1145/356555910:3(1-36)Online publication date: 15-Feb-2023
  • (2023)Strategic Information Revelation Mechanism in Crowdsourcing Applications Without VerificationIEEE Transactions on Mobile Computing10.1109/TMC.2021.313144522:5(2989-3003)Online publication date: 1-May-2023
  • (2022)Learning from Crowds with Mutual Correction-Based Co-Training2022 IEEE International Conference on Knowledge Graph (ICKG)10.1109/ICKG55886.2022.00040(257-264)Online publication date: Nov-2022
  • (2021)The Limits of Multi-task Peer PredictionProceedings of the 22nd ACM Conference on Economics and Computation10.1145/3465456.3467642(907-926)Online publication date: 18-Jul-2021
  • (2021)Strategic Information Revelation in Crowdsourcing Systems Without VerificationIEEE INFOCOM 2021 - IEEE Conference on Computer Communications10.1109/INFOCOM42981.2021.9488853(1-10)Online publication date: 10-May-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media