tag:blogger.com,1999:blog-255627052019-04-23T06:32:49.662-04:00Adventures in ComputationAaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.comBlogger89125tag:blogger.com,1999:blog-25562705.post-7640412054712349752019-04-09T14:18:00.001-04:002019-04-09T14:18:22.630-04:00The Ethical Algorithm<div class="separator" style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-nzPVP9O6SOw/XKzg_FfbvsI/AAAAAAAARnY/V8Ky09-gas8kroK1MTjFkf4vJiwoXefhwCLcBGAs/s1600/Kearns_EthicalAlgorithm_comp1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1425" data-original-width="938" height="320" src="https://2.bp.blogspot.com/-nzPVP9O6SOw/XKzg_FfbvsI/AAAAAAAARnY/V8Ky09-gas8kroK1MTjFkf4vJiwoXefhwCLcBGAs/s320/Kearns_EthicalAlgorithm_comp1.jpg" width="211" /></a></div>I've had the good fortune to be able work on a number of research topics so far: including privacy, fairness, algorithmic game theory, and adaptive data analysis, and the relationship between all of these things and machine learning. As an academic, we do a lot of writing about the things we work on, but usually our audience is narrow and technical: other researchers in our sub-specialty. But it can be both fun and important to communicate to a wider audience as well. So my amazing colleague Michael Kearns and I wrote a book, called <a href="https://www.amazon.com/Ethical-Algorithm-Science-Socially-Design/dp/0190948205">The Ethical Algorithm</a>. It's coming out in October (Amazon says the release date is November 1st, but my understanding is that pre-orders will start shipping on October 4).<br /><br />This was the first time for either of us writing something like this: it's not a textbook, it's a "trade book" -- a popular science book. Its intended readership isn't just computer science PhDs, but the educated public broadly. But there should be plenty in it to interest experts too, because we cover quite a bit of ground. The book is about the problems that arise when algorithmic decision making interacts with human beings --- and the emerging science about how to fix them. The topics we cover include privacy, fairness, strategic interactions and gaming, and the scientific reproducibility crisis.<br /><br />Lots has been written about the problems that can arise, especially related to privacy and fairness. And we're not trying to reinvent the wheel. Instead, the focus of our book is the exciting and embryonic algorithmic science that has grown to address these issues.<br /><br />The privacy chapter develops differential privacy, and its strengths and weaknesses. The fairness chapter covers recent work on algorithmic fairness that has come out of the computer science literature. The gaming chapter studies how algorithm design can affect the equilibria that emerge from large scale interactions. The reproducibility chapter explores the underlying issues that lead to false discovery, and recent algorithmic advances that hold promise in avoiding them. We try and set expectations appropriately. We don't pretend that the solutions to complex societal problems can be entirely (or even primarily) algorithmic. But we argue that embedding social values into algorithms will inevitably form an important component of any solution.<br /><br />I'm really excited for it to come out. If you want, you can pre-order it now, either at Amazon: <a href="https://www.amazon.com/Ethical-Algorithm-Science-Socially-Design/dp/0190948205">https://www.amazon.com/Ethical-Algorithm-Science-Socially-Design/dp/0190948205</a> or directly from the publisher: <a href="https://global.oup.com/academic/product/the-ethical-algorithm-9780190948207?cc=us&lang=en&#.XKegC9eWi2w.twitter">https://global.oup.com/academic/product/the-ethical-algorithm-9780190948207?cc=us&lang=en&#.XKegC9eWi2w.twitter</a>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-22516451658743787502019-02-26T15:41:00.000-05:002019-02-26T16:01:16.391-05:00Impossibility Results in Fairness as Bayesian Inference<script type="text/x-mathjax-config"> MathJax.Hub.Config({tex2jax: {inlineMath: [['$','$'], ['\\(','\\)']]}}); </script> <script src="https://cdn.mathjax.org/mathjax/latest/MathJax.js?config=TeX-AMS-MML_HTMLorMML" type="text/javascript"> </script>One of the most striking results about fairness in machine learning is the impossibility result that <a href="https://www.liebertpub.com/doi/full/10.1089/big.2016.0047">Alexandra Chouldechova</a>, and separately<a href="https://arxiv.org/abs/1609.05807"> Jon Kleinberg, Sendhil Mullainathan, and Manish Raghavan</a> discovered a few years ago. These papers say something very crisp. I'll focus here on the binary classification setting that Alex studies because it is much simpler. There are (at least) three reasonable properties you would want your "fair" classifiers to have. They are:<br /><div><ol><li><b>False Positive Rate Balance</b>: The rate at which your classifier makes errors in the positive direction (i.e. labels negative examples positive) should be the same across groups.</li><li><b>False Negative Rate Balance</b>: The rate at which your classifier makes errors in the negative direction (i.e. labels positive examples negative) should be the same across groups.</li><li><b>Predictive Parity</b>: The statistical "meaning" of a positive classification should be the same across groups (we'll be more specific about what this means in a moment)</li></ol><div>What Chouldechova and KMR show is that if you want all three, you are out of luck --- unless you are in one of two very unlikely situations: Either you have a <i>perfect</i> classifier that never errs, or the <i>base rate</i> is exactly the same for both populations --- i.e. both populations have exactly the same frequency of positive examples. If you don't find yourself in one of these two unusual situations, then you have to give up on properties 1, 2, or 3. </div></div><div><br /></div><div>This is discouraging, because there are good reasons to want each of properties 1, 2, and 3. And these aren't measures made up in order to formulate an impossibility result --- they have their root in the <a href="https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing">Propublica/COMPASS controversy</a>. Roughly speaking, Propublica discovered that the COMPASS recidivism prediction algorithm violated false positive and negative rate balance, and they took the position that this made the classifier <i>unfair</i>. Northpointe (the creators of the COMPASS algorithm) responded by saying that their algorithm satisfied predictive parity, and took the position that this made the classifier fair. They were seemingly talking past each other by using two different definitions of what "fair" should mean. What the impossibility result says is that there is no way to satisfy both sides of this debate. </div><div><br /></div><div>So why is this result true? The proof in Alex's paper can't be made simpler --- its already a one liner, following from an algebraic identity. But the first time I read it I didn't have a great intuition for <i>why</i> it held. Viewing the statement through the lens of Bayesian inference made the result very intuitive (at least for me). With this viewpoint, all the impossibility result is saying is: "If you have different <i>priors</i> about some event (say that a released inmate will go on to commit a crime) for two different populations, and you receive evidence of the same strength for both populations, then you will have different posteriors as well". This is now bordering on obvious --- because your posterior belief about an event is a combination of your prior belief and the new evidence you have received, weighted by the strength of that evidence. </div><div><br /></div><div>Lets walk through this. Suppose we have two populations, call them $A$s and $B$s. Individuals $x$ from these populations have some true binary label $\ell(x) \in \{0,1\}$ which we are trying to predict. Individuals from the two populations are drawn from different distributions, which we'll call $D_A$ and $D_B$. We have some classifier that predicts labels $\hat\ell(x)$, and we would like it to satisfy the three fairness criteria defined above. First, lets define some terms:<br /><br />The <i>base rate</i> for a population $i$ is just the frequency of positive labels:<br />$$p_i = \Pr_{x \sim D_i}[\ell(x) = 1].$$<br />The <i>false positive </i>and <i>false negative </i>rates of the classifier are:<br />$$FPR_i = \Pr_{x \sim D_i}[\hat\ell(x) = 1 | \ell(x) = 0] \ \ \ \ FNR_i = \Pr_{x \sim D_i}[\hat\ell(x) = 0 | \ell(x) = 1].$$<br />And the <i>positive predictive value</i> of the classifier is:<br />$$PPV_i = \Pr_{x \sim D_i}[\ell(x) = 1 | \hat\ell(x)=1].$$</div><div>Satisfying all three fairness constraints just means finding a classifier such that $FPR_A = FPR_B$, $FNR_A = FNR_B$, and $PPV_A = PPV_B$.<br /><br />How should we prove that this is impossible? All three of these quantities are conditional probabilities, so we are essentially obligated to apply Bayes Rule:<br />$$PPV_i = \Pr_{x \sim D_i}[\ell(x) = 1 | \hat\ell(x)=1] = \frac{ \Pr_{x \sim D_i}[\hat\ell(x)=1 | \ell(x) = 1]\cdot \Pr_{x \sim D_i} [\ell(x) = 1]}{ \Pr_{x \sim D_i}[\hat \ell(x) = 1]}$$<br />But now these quantities on the right hand side are things we have names for. Substituting in, we get:<br />$$PPV_i = \frac{p_i(1-FNR_i)}{p_i(1-FNR_i) + (1-p_i)FPR_i}$$<br /><br />And so now we see the problem. Suppose we have $FNR_A = FNR_B$ and $FPR_A = FPR_B$. Can we have $PPV_A = PPV_B$? There are only two ways. If $p_A = p_B$, then we are done, because the right hand side is the same for either $i \in \{A,B\}$. But if the base rates are different, then the only way to make these two quantities equal is if $FNR_i = FPR_i = 0$ --- i.e. if our classifier is perfect.<br /><br />The piece of intuition here is that the base rate is our prior belief that $\ell(x) = 1$, before we see the output of the classifier. The positive predictive value is our <i>posterior</i> belief that $\ell(x) = 1$, after we see the output of the classifier. And all we need to know about the classifier in order to apply Bayes rule to derive our posterior from our prior is its false positive rate and its false negative rate --- these fully characterize the "strength of the evidence." Hence: "If our prior probabilities differ, and we see evidence of a positive label of the same strength, then our posterior probabilities will differ as well."<br /><br />Once you realize this, then you can generalize the fairness impossibility result to other settings by making equally obvious statements about probability elsewhere. :-)<br /><br />For example, suppose we generalize the labels to be real valued instead of binary --- so when making decisions, we can model individuals using shades of gray. (e.g. in college admissions, we don't have to model individuals as "qualified" or not, but rather can model talent as a real value.) Lets fix a model for concreteness, but the particulars are not important. (The model here is related to my paper with <a href="https://www.cis.upenn.edu/~kannan/">Sampath Kannan</a> and<a href="http://www.its.caltech.edu/~jziani/"> Juba Ziani </a>on <a href="https://arxiv.org/abs/1808.09004">the downstream effects of affirmative action</a>)<br /><br />Suppose that in population $i$, labels are distributed according to a Gaussian distribution with mean $\mu_i$: $\ell(x) \sim N(\mu_i, 1)$. For an individual from group $i$, we have a test that gives an unbiased estimator of their label, with some standard deviation $\sigma_i$: $\hat \ell(x) \sim N(\ell(x), \sigma_i)$.<br /><br />In a model like this, we have analogues of our fairness desiderata in the binary case:<br /><br /><ul><li><b>Analogue of Error Rate Balance</b><i style="font-weight: bold;">: </i>We would like our test to be equally informative about both populations: $\sigma_A = \sigma_B$. </li><li><b>Analogue of Predictive Parity</b>: Any test score $t$ should induce the same posterior expectation on true labels across populations: $$E_{D_A}[\ell(x) | \hat \ell(x) = t] = E_{D_B}[\ell(x) | \hat \ell(x) = t]$$ </li></ul><div>Can we satisfy both of these conditions at the same time? Because the normal distribution is <i>self conjugate</i> (that's why we chose it!) Bayes Rule simplifies to have a nice closed form, and we can compute our posteriors as follows:</div><div>$$E_{D_i}[\ell(x) | \hat \ell(x) = t] = \frac{\sigma_i^2}{\sigma_i^2 + 1}\cdot \mu_i + \frac{1}{\sigma_i^2 + 1}\cdot t$$</div><div>So there are only two ways we can achieve both properties:</div><div><ol><li>We can of course satisfy both conditions if the prior distributions are the same for both groups: $\mu_A = \mu_B$. Then we can set $\sigma_A = \sigma_B$ and observe that the right hand side of the above expression is identical for $i \in \{A, B\}$.</li><li>We can also satisfy both conditions if the prior means are different, but the signal is perfect: i.e. $\sigma_A = \sigma_B = 0$. (Then both posterior means are just $t$, independent of the prior means). </li></ol></div>But we can see from inspection these are the only two cases. If $\sigma_A = \sigma_B$, but the prior means are different, then the posterior means will be different for every $t$. This is really the same impossibility result as in the binary case: all it is saying is that if I have different priors about different groups, but the evidence I receive has the same strength, then my posteriors will also be different.<br /><br />So the mathematical fact is simple --- but its implications remain deep. It means we have to choose between equalizing a decision maker's posterior about the label of an individual, or providing an equally accurate signal about each individual, and that we cannot have both. Unfortunately, living without either one of these conditions can lead to real harm.<br /><br /></div><div><br /></div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-25591568418001877152019-01-26T17:19:00.001-05:002019-01-28T08:54:32.268-05:00Algorithmic Unfairness Without Any Bias Baked InDiscussion of (un)fairness in machine learning hit mainstream political discourse this week, when Representative Alexandria Ocasio-Cortez discussed the possibility of algorithmic bias, and was clumsily "called out" by Ryan Saavedra on twitter: <br /><center><blockquote class="twitter-tweet" data-lang="en"><div dir="ltr" lang="en">Socialist Rep. Alexandria Ocasio-Cortez (D-NY) claims that algorithms, which are driven by math, are racist <a href="https://t.co/X2veVvAU1H">pic.twitter.com/X2veVvAU1H</a>— Ryan Saavedra (@RealSaavedra) <a href="https://twitter.com/RealSaavedra/status/1087627739861897216?ref_src=twsrc%5Etfw">January 22, 2019</a><script async="" charset="utf-8" src="https://platform.twitter.com/widgets.js"></script></div></blockquote></center>It was gratifying to see the number of responses pointing out how wrong he was --- awareness of algorithmic bias has clearly become pervasive! But most of the pushback focused on the possibility of bias being "baked in" by the designer of the algorithm, or because of latent bias embedded in the data, or both: <br /><center><blockquote class="twitter-tweet" data-conversation="none" data-lang="en"><div dir="ltr" lang="en">You know algorithms are written by people right? And that the data they are trained on is made and selected by people? And that the problems algorithms solve are decided...again...by people? And that people can be and many times are racist? Ok now you do the math</div>— kade (@onekade) <a href="https://twitter.com/onekade/status/1087853353000939521?ref_src=twsrc%5Etfw">January 22, 2019</a></blockquote><script async="" charset="utf-8" src="https://platform.twitter.com/widgets.js"></script></center>Bias in the data is certainly a problem, especially when labels are gathered by human beings. But its far from being the only problem. In this post, I want to walk through a very simple example in which the algorithm designer is being entirely reasonable, there are no human beings injecting bias into the labels, and yet the resulting outcome is "unfair". Here is the (toy) scenario -- the specifics aren't important. High school students are applying to college, and each student has some innate "talent" $I$, which we will imagine is normally distributed, with mean 100 and standard deviation 15: $I \sim N(100,15)$. The college would like to admit students who are sufficiently talented --- say one standard deviation above the mean (so, it would like to admit students with $I \geq 115$). The problem is that talent isn't directly observable. Instead, the college can observe <i>grades</i> $g$ and <i>SAT scores $s$</i>, which are a noisy estimate of talent. For simplicity, lets imagine that both grades and SAT scores are independently and normally distributed, centered at a student's talent level, and also with standard deviation 15: $g \sim N(I, 15)$, $s \sim N(I, 15)$.<br /><br />In this scenario, the college has a simple, optimal decision rule: It should run a linear regression to try and predict student talent from grades and SAT scores, and then it should admit the students whose <i>predicted </i>talent is at least 115. This is indeed "driven by math" --- since we assumed everything was normally distributed here, this turns out to correspond to the Bayesian optimal decision rule for the college.<br /><br />Ok. Now lets suppose there are two populations of students, which we will call Reds and Blues. Reds are the majority population, and Blues are a small minority population --- the Blues's only make up about 1% of the student body. But the Reds and the Blues are no different when it comes to talent: they both have the same talent distribution, as described above. And there is no bias baked into the grading or the exams: both the Reds and the Blues also have exactly the same grade and exam score distributions, as described above.<br /><br />But there is one difference: the Blues have a bit more money than the Reds, so they each take the SAT twice, and report only the highest of the two scores to the college. This results in a small but noticeable bump in their average SAT scores, compared to the Reds. Here are the grades and exam scores for the two populations, plotted:<br /><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-B7-EMI0LIZ8/XEzQO2OBAsI/AAAAAAAAQ3o/PFO_wd6igLgwpA5OCQ1Ux0N7B9A5s3mcACLcBGAs/s1600/gradesexams.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="960" data-original-width="1464" height="261" src="https://1.bp.blogspot.com/-B7-EMI0LIZ8/XEzQO2OBAsI/AAAAAAAAQ3o/PFO_wd6igLgwpA5OCQ1Ux0N7B9A5s3mcACLcBGAs/s400/gradesexams.png" width="400" /></a></div><div class="separator" style="clear: both; text-align: center;"></div>So what is the effect of this when we use our reasonable inference procedure? First, lets consider what happens when we learn two different regression models: one for the Blues, and a different one for the Reds. We don't see much difference:<br /><br />The Red classifier makes errors approximately 11% of the time. The Blue classifier does about the same --- it makes errors about 10.4% of the time. This makes sense: the Blues artificially inflated their SAT score distribution without increasing their talent, and the classifier picked up on this and corrected for it. In fact, it is even a little more accurate!<br /><br />And since we are interested in fairness, lets think about the <i>false negative rate</i> of our classifiers. "False Negatives" in this setting are the people who are qualified to attend the college ($I > 115$), but whom the college mistakenly rejects. These are really the people who have come to harm as a result of the classifier's mistakes. And the False Negative <i>Rate</i> is the probability that a randomly selected qualified person is mistakenly rejected from college --- i.e. the probability that a randomly selected student is harmed by the classifier. We should want that the false negative rates are approximately equal across the two populations: this would mean that the burden of harm caused by the classifier's mistakes is not disproportionately borne by one population over the other. This is one reason why the difference between false negative rates across different populations has become a standard fairness metric in algorithmic fairness --- <a href="http://papers.nips.cc/paper/6373-equality-of-opportunity-in-supervised-learning">sometimes referred to as "equal opportunity."</a><br /><br />So how do we fare on this metric? Not so badly! The Blue model has a false negative rate of 50% on the blues, and the Red model has a false negative rate of 47% on the reds --- so the difference between these two is a satisfyingly small 3%.<br /><br />But you might reasonably object: because we have learned separate models for the Blues and the Reds, we are <i>explicitly </i>making admissions decisions as a function of a student's color! This might sound like a form of discrimination, baked in by the algorithm designer --- and if the two populations represent e.g. racial groups, then its explicitly illegal in a number of settings, including lending.<br /><br />So what happens if we don't allow our classifier to see group membership, and just train one classifier on the whole student body? The gap in false negative rates between the two populations balloons to 12.5%, and the overall error rate ticks up. This means if you are a qualified member of the Red population, you are substantially more likely to be mistakenly rejected by our classifier than if you are a qualified member of the Blue population.<br /><br />What happened? There wasn't any malice anywhere in this data pipeline. Its just that the Red population was much larger than the Blue population, so when we trained a classifier to minimize its average error over the entire student body, it naturally fit the Red population --- which contributed much more to the <i>average</i>. But this means that the classifier was no longer compensating for the artificially inflated SAT scores of the Blues, and so was making a disproportionate number of errors on them --- all in their favor.<br /><br /><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody><tr><td style="text-align: center;"><a href="https://4.bp.blogspot.com/-W3rfiRIJUC0/XEzciybyBfI/AAAAAAAAQ4A/lmABxaYed28K77up20emGgc3TMr8D05QQCLcBGAs/s1600/classifier.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="960" data-original-width="1460" height="262" src="https://4.bp.blogspot.com/-W3rfiRIJUC0/XEzciybyBfI/AAAAAAAAQ4A/lmABxaYed28K77up20emGgc3TMr8D05QQCLcBGAs/s400/classifier.png" width="400" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">The combined admissions rule takes everyone above the black line. Since the Blues are shifted up relative to the Reds, they are admitted at a disproportionately higher rate. </td></tr></tbody></table><div class="separator" style="clear: both; text-align: center;"></div><br /><br />This is the kind of thing that happens <i>all the time</i>: whenever there are two populations that have different feature distributions, learning a single classifier (that is prohibited from discriminating based on population) will fit the bigger of the two populations, simply because they contribute more to average error. Depending on the nature of the distribution difference, this can be either to the benefit or the detriment of the minority population. And not only does this not involve any explicit human bias, either on the part of the algorithm designer or the data gathering process, <i>it is exacerbated if we artificially force the algorithm to be group blind</i>. Well intentioned "fairness" regulations prohibiting decision makers form taking sensitive attributes into account can actually make things less fair and less accurate at the same time.<br /><br /><br /><br /><br />Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-23660775307529850912019-01-10T15:26:00.000-05:002019-01-10T15:27:20.128-05:002019 SIGecom Dissertation Award: Call for Nominations<div class="MsoNormal" style="margin: 0px;">Dear all,<br /><br />Please consider nominating graduating Ph.D. students for the SIGecom Dissertation Award. If you are a graduating student, consider asking your adviser or other senior mentor to nominate you.<br /><br />Nominations are due on February 28, 2019. This award is given to a student who defended a thesis in 2018. It is a prestigious award and is accompanied by a $1500 prize. In the past, the grand prize has been awarded to:<br /><br />2017: Aviad Rubinstein, "Hardness of Approximation Between P and NP"<br />2016: Peng Shi, "Prediction and Optimization in School Choice"<br />2015: Inbal Talgam-Cohen, "Robust Market Design: Information and Computation "<br />2014: S. Matthew Weinberg, "Algorithms for Strategic Agents"<br />2013: Balasubramanian Sivan, "Prior Robust Optimization"<br /><br /><br />And the award has had seven runner-ups: Rachel Cummings, Christos Tzamos, Bo Waggoner, James Wright, Xi (Alice) Gao, Yang Cai, and Sigal Oren. You can find detailed information about the nomination process at: <a href="http://www.sigecom.org/awardd.html">http://www.sigecom.org/awardd.html</a>. We look forward to reading your nominations!<br /><br /><br />Your Award Committee,<br /><b><br /></b><b>Renato Paes Leme</b><br /><b>Aaron Roth</b> (Chair)<br /><b>Inbal Talgam-Cohen</b></div><div class="m_-6389343170732676329gmail-adL" style="background-color: white; color: #222222; font-size: small;"><span class="m_-6389343170732676329gmail-im" style="color: #500050;"></span><br /><div style="font-family: arial, helvetica, sans-serif;"></div></div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-79617626242519666022018-03-12T09:58:00.000-04:002018-03-12T09:58:12.150-04:00Call for nominations for the SIGecom Dissertation Award<div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px;"><div><div><div><div>Dear all,</div><div><br /></div><div>Please consider nominating recently graduated Ph.D. students working in algorithmic game theory/mechanism design/market design for the SIGecom Dissertation Award. If you are a graduating student, consider asking your adviser or other senior mentor to nominate you.<br /><br />Nominations are due at the end of this month, <span class="aBn" data-term="goog_217668748" style="border-bottom: 1px dashed rgb(204, 204, 204); position: relative; top: -2px; z-index: 0;" tabindex="0"><span class="aQJ" style="position: relative; top: 2px; z-index: -1;">March 31, 2018</span></span>. This award is given to a student who defended a thesis in 2017. It is a prestigious award and is accompanied by a $1500 prize. In the past, the grand prize has been awarded to:<br /><br />2016: Peng Shi, " Prediction and Optimization in School Choice"<br />2015: Inbal Talgam-Cohen, " Robust Market Design: Information and Computation "<br />2014: S. Matthew Weinberg, "Algorithms for Strategic Agents"<br />2013: Balasubramanian Sivan, " Prior Robust Optimization"<br /></div>and the award has had five runner-ups, Bo Waggoner, James Wright, Xi (Alice) Gao, Yang Cai, and Sigal Oren. You can find detailed information about the nomination process at: <a data-saferedirecturl="https://www.google.com/url?hl=en&q=http://www.sigecom.org/awardd.html&source=gmail&ust=1520949336465000&usg=AFQjCNElDx295OAKkTeZqXtE4H3LQPDQFQ" href="http://www.sigecom.org/awardd.html" style="color: #1155cc;" target="_blank">http://www.sigecom.org/awardd.<wbr></wbr>html</a>. We look forward to reading your nominations!<br /></div>Your Award Committee,<br /></div>Nicole Immorlica</div>Ariel Procaccia</div><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px;">Aaron Roth</span><br /><div><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px;"><br /></span></div><div class="yj6qo" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px;"></div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-85755745253144963522018-03-04T21:14:00.000-05:002018-03-06T10:02:27.683-05:00How (un)likely is an "intelligence explosion"?<script type="text/x-mathjax-config"> MathJax.Hub.Config({tex2jax: {inlineMath: [['$','$'], ['\\(','\\)']]}}); </script> <script src="https://cdn.mathjax.org/mathjax/latest/MathJax.js?config=TeX-AMS-MML_HTMLorMML" type="text/javascript"> </script> <br /><div class="separator" style="clear: both; text-align: center;"></div>I've been having fun recently reading about "AI Risk". There is lots of eloquent writing out there about this topic: I especially recommend <a href="http://slatestarcodex.com/superintelligence-faq/">Scott Alexander's Superintelligence FAQ</a> for those looking for a fun read. The subject has reached the public consciousness, with high profile people like <a href="http://www.newsweek.com/stephen-hawking-artificial-intelligence-warning-destroy-civilization-703630">Stephen Hawking</a> and <a href="https://www.npr.org/sections/thetwo-way/2017/07/17/537686649/elon-musk-warns-governors-artificial-intelligence-poses-existential-risk">Elon Musk</a> speaking publicly about it. There is also an increasing amount of funding and research effort being devoted to understanding AI risk. See for example the <a href="https://www.fhi.ox.ac.uk/">Future of Humanity Institute</a> at Oxford, the<a href="https://futureoflife.org/"> Future of Life Institute</a> at MIT, and the <a href="https://intelligence.org/">Machine Intelligence Research Institute</a> in Berkeley, among others. These groups seem to be doing lots of interesting research, which I am mostly ignorant of. In this post I just want to talk about a simple exercise in asymptotics.<br /><br /><div style="text-align: center;"><b>First, Some Background.</b></div><br />A "superintelligent" AI is loosely defined to be an entity that is much better than we are at essentially any cognitive/learning/planning task. Perhaps, by analogy, a superintelligent AI is to human beings as human beings are to Bengal tigers, in terms of general intelligence. It shouldn't be hard to convince yourself that if we were in the company of a superintelligence, then we would be very right to be worried: after all, it is intelligence that allows human beings to totally dominate the world and drive Bengal tigers to near extinction, despite the fact that tigers physiologically dominate humans in most other respects. This is the case even if the superintelligence doesn't have the destruction of humanity as a goal per-se (after all, we don't have it out for tigers), and even if the superintelligence is just an unconscious but super-powerful optimization algorithm. I won't rehash the arguments here (<a href="http://slatestarcodex.com/superintelligence-faq/">Scott does it better</a>) but it essentially boils down to the fact that it is quite hard to anticipate what the results of optimizing an objective function will be, if the optimization is done over a sufficiently rich space of strategies. And if we get it wrong, and the optimization has some severely unpleasant side-effects? It is tempting to suggest that at that point, we just unplug the computer and start over. The problem is that if we unplug the intelligence, it won't do as well at optimizing its objective function compared to if it took steps to prevent us from unplugging it. So if it's strategy space is rich enough so that it is able to take steps to defend itself, it will. Lots of the most interesting research in this field seems to be about how to align optimization objectives with our own desires, or simply how to write down objective functions that don't induce the optimization algorithm to try and prevent us from unplugging it, while also not incentivizing the algorithm to unplug itself (the <a href="https://intelligence.org/files/Corrigibility.pdf">corrigibility </a>problem).<br /><br />Ok. It seems uncontroversial that a hypothetical superintelligence would be something we should take very seriously as a danger. But isn't it premature to worry about this, given how far off it seems to be? We aren't even that good at <a href="http://funnytweeter.com/wired-machine-learning-will-take-over-the-worldamazon-we-see-you-bought-a-wallet-would-you-like-to-buy-another-wallet/">making product recommendations</a>, let alone optimization algorithms so powerful that they might inadvertently destroy all of humanity. Even if superintelligence will ultimately be something to take very seriously, are we even in a position to productively think about it now, given how little we know about how such a thing might work at a technical level? This seems to be the position that Andrew Ng was taking, in his much quoted statement that (paraphrasing) worrying about the dangers of super-intelligence right now is like worrying about overpopulation on Mars. Not that it might not eventually be a serious concern, but that we will get a higher return investing our intellectual efforts right now on more immediate problems.<br /><br />The standard counter to this is that super-intelligence might always seem like it is well beyond our current capabilities -- maybe centuries in the future -- until, all of a sudden, it appears as the result of an uncontrollable chain reaction known as an "intelligence explosion", or "singularity". (As far as I can tell, very few people actually think that intelligence growth would exhibit an actual mathematical singularity --- this seems instead to be a metaphor for exponential growth.) If this is what we expect, then now might very well be the time to worry about super-intelligence. The first argument of this form was put forth by British mathematician I.J. Good (of <a href="https://en.wikipedia.org/wiki/Good%E2%80%93Turing_frequency_estimation">Good-Turing Frequency Estimation</a>!):<br /><blockquote class="tr_bq">“Let an ultraintelligent machine be defined as a machine that can far surpass all the intellectual activities of any man however clever. Since the design of machines is one of these intellectual activities, an ultraintelligent machine could design even better machines; there would then unquestionably be an ‘intelligence explosion,’ and the intelligence of man would be left far behind. Thus the first ultraintelligent machine is the last invention that man need ever make, provided that the machine is docile enough to tell us how to keep it under control.”</blockquote>Scott Alexander summarizes the same argument a bit more quantitatively. In this passage, he is imagining the starting point being a full-brain simulation of Einstein --- except run on faster hardware, so that our simulated Einstein operates at a much faster clock-speed than his historical namesake:<br /><blockquote class="tr_bq">It might, like the historical Einstein, contemplate physics. Or it might contemplate an area very relevant to its own interests: artificial intelligence. In that case, instead of making a revolutionary physics breakthrough every few hours, it will make a revolutionary AI breakthrough every few hours. Each AI breakthrough it makes, it will have the opportunity to reprogram itself to take advantage of its discovery, becoming more intelligent, thus speeding up its breakthroughs further. The cycle will stop only when it reaches some physical limit – some technical challenge to further improvements that even an entity far smarter than Einstein cannot discover a way around. </blockquote><blockquote class="tr_bq">To human programmers, such a cycle would look like a “critical mass”. Before the critical level, any AI advance delivers only modest benefits. But any tiny improvement that pushes an AI above the critical level would result in a feedback loop of inexorable self-improvement all the way up to some stratospheric limit of possible computing power. </blockquote><blockquote class="tr_bq">This feedback loop would be exponential; relatively slow in the beginning, but blindingly fast as it approaches an asymptote. Consider the AI which starts off making forty breakthroughs per year – one every nine days. Now suppose it gains on average a 10% speed improvement with each breakthrough. It starts on January 1. Its first breakthrough comes January 10 or so. Its second comes a little faster, January 18. Its third is a little faster still, January 25. By the beginning of February, it’s sped up to producing one breakthrough every seven days, more or less. By the beginning of March, it’s making about one breakthrough every three days or so. But by March 20, it’s up to one breakthrough a day. By late on the night of March 29, it’s making a breakthrough every second.</blockquote>As far as I can tell, this possibility of an exponentially-paced intelligence explosion is the main argument for folks devoting time to worrying about super-intelligent AI <i>now</i>, even though current technology doesn't give us anything even close. So in the rest of this post, I want to push a little bit on the claim that the feedback loop induced by a self-improving AI would lead to exponential growth, and see what assumptions underlie it.<br /><br /><div style="text-align: center;"><b>A Toy Model for Rates of Self Improvement</b></div><br />Lets write down an extremely simple toy model for how quickly the intelligence of a self improving system would grow, as a function of time. And I want to emphasize that the model I will propose is clearly a toy: it abstracts away everything that is interesting about the problem of designing an AI. But it should be sufficient to focus on a simple question of asymptotics, and the degree to which growth rates depend on the extent to which AI research exhibits diminishing marginal returns on investment. In the model, AI research accumulates with time: at time t, R(t) units of AI research have been conducted. Perhaps think of this as a quantification of the number of AI "breakthroughs" that have been made in Scott Alexander's telling of the intelligence explosion argument. The intelligence of the system at time t, denoted I(t), will be some function of the accumulated research R(t). The model will make two assumptions:<br /><br /><ol><li>The rate at which research is conducted is directly proportional to the current intelligence of the system. We can think about this either as a discrete dynamics, or as a differential equation. In the discrete case, we have: $R(t+1) = R(t) + I(t)$, and in the continuous case: $\frac{dR}{dt} = I(t)$. </li><li>The relationship between the current intelligence of the system and the currently accumulated quantity of research is governed by some function f: $I(t) = f(R(t))$.</li></ol><div>The function f can be thought of as capturing the <i>marginal rate of return </i>of additional research on the actual intelligence of an AI. For example, if we think AI research is something like pumping water from a well --- a task for which doubling the work doubles the return --- then, we would model f as linear: $f(x) = x$. In this case, AI research does not exhibit any diminishing marginal returns: a unit of research gives us just as much benefit in terms of increased intelligence, no matter how much we already understand about intelligence. On the other hand, if we think that AI research should exhibit diminishing marginal returns --- as many creative endeavors seem to --- then we would model f as an increasing concave function. For example, we might let $f(x) = \sqrt{x}$, or $f(x) = x^{2/3}$, or $f(x) = x^{1/3}$, etc. If we are really pessimistic about the difficulty of AI, we might even model $f(x) = \log(x)$. In these cases, intelligence is still increasing in research effort, but the rate of increase as a function of research effort is diminishing, as we understand more and more about AI. Note however that the rate at which research is being conducted is increasing, which might still lead us to exponential growth in intelligence, if it increases fast enough.</div><div><br /></div><div>So how does our choice of f affect intelligence growth rates? First, lets consider the case in which $f(x) = x$ --- the case of no diminishing marginal returns on research investment. Here is a plot of the growth over 1000 time steps in the discrete model: </div><div class="separator" style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-NbHTMjVG8X4/WpwfWK9686I/AAAAAAAAMFk/wvch5-xLSukezDHSXs6FADECuPDiah_qgCEwYBhgL/s1600/linear.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="273" data-original-width="380" height="229" src="https://2.bp.blogspot.com/-NbHTMjVG8X4/WpwfWK9686I/AAAAAAAAMFk/wvch5-xLSukezDHSXs6FADECuPDiah_qgCEwYBhgL/s320/linear.png" width="320" /></a></div><div>Here, we see exponential growth in intelligence. (It isn't hard to directly work out that in this case, in the discrete model, we have $I(t) = 2^t$, and in the continuous model, we have $I(t) = e^t$). And the plot illustrates the argument for worrying about AI risk <i>now</i>. Viewed at this scale, progress in AI appears to plod along at unimpressive levels before suddenly shooting up to an unimaginable level: in this case, a quantity if written down as a decimal that would have more than 300 zeros. </div><div><br /></div><div>It isn't surprising that if we were to model severely diminishing returns --- say $f(x) = \log(x)$, that this would not occur. Below, we plot what happens when $f(x) = \log(x)$, with time taken out all the way to 1,000,000 rather than merely 1000 as in the above plot:</div><div class="separator" style="clear: both; text-align: center;"><a href="https://3.bp.blogspot.com/-r5_3JqvijEA/Wpw7oVIubQI/AAAAAAAAMFw/dvOhuSSeROYVjH3uZWKrhCrcTENgr0xvwCLcBGAs/s1600/log.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="266" data-original-width="389" height="218" src="https://3.bp.blogspot.com/-r5_3JqvijEA/Wpw7oVIubQI/AAAAAAAAMFw/dvOhuSSeROYVjH3uZWKrhCrcTENgr0xvwCLcBGAs/s320/log.png" width="320" /></a></div><div>Intelligence growth is not very impressive here. At time 1,000,000 we haven't even reached 17. If you wanted to reach (say) an intelligence level of 30 you'd have to wait an unimaginably long time. In this case, we definitely don't need to worry about an "intelligence explosion", and probably not even about <i>ever </i>reaching anything that could be called a super-intelligence. </div><div><br /></div><div>But what about moderate (polynomial) levels of diminishing marginal returns. What if we take $f(x) = x^{1/3}$? Lets see:</div><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-u2OdxHbY7m8/Wpw8Z4YOUoI/AAAAAAAAMF4/6NYvU_sG7WMkGzqcvnq-MNU2x2K1MA8SQCLcBGAs/s1600/one%2Bthird.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="266" data-original-width="386" height="220" src="https://1.bp.blogspot.com/-u2OdxHbY7m8/Wpw8Z4YOUoI/AAAAAAAAMF4/6NYvU_sG7WMkGzqcvnq-MNU2x2K1MA8SQCLcBGAs/s320/one%2Bthird.png" width="320" /></a></div><div>Ok --- now we are making more progress, but even though intelligence now has a polynomial relationship to research (and research speed is increasing, in a chain reaction!) the rate of growth in intelligence is still <i>decreasing</i>. What about if $f(x) = \sqrt{x}$? Lets see:</div><div class="separator" style="clear: both; text-align: center;"><a href="https://3.bp.blogspot.com/-zjkn7z9-nkE/Wpw87l13nWI/AAAAAAAAMGE/RDV1b77CAV87fUK5geqNTi8CeVuqzkYUwCLcBGAs/s1600/sqrt.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="266" data-original-width="392" height="217" src="https://3.bp.blogspot.com/-zjkn7z9-nkE/Wpw87l13nWI/AAAAAAAAMGE/RDV1b77CAV87fUK5geqNTi8CeVuqzkYUwCLcBGAs/s320/sqrt.png" width="320" /></a></div><div>At least now the rate of growth doesn't seem to be decreasing: but it is growing only linearly with time. Hardly an explosion. Maybe we just need to get more aggressive in our modeling. What if $f(x) = x^{2/3}$? </div><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-z6tk89sEBzo/WpxUJPiASrI/AAAAAAAAMGU/J62ANBiWncgIdZyRWWgvSWcS4H5YEbeZACLcBGAs/s1600/twothirds.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="266" data-original-width="411" height="207" src="https://1.bp.blogspot.com/-z6tk89sEBzo/WpxUJPiASrI/AAAAAAAAMGU/J62ANBiWncgIdZyRWWgvSWcS4H5YEbeZACLcBGAs/s320/twothirds.png" width="320" /></a></div><div>Ok, now we've got something! At least now the rate of intelligence gains is <i>increasing</i> with time. But it is increasing more slowly than a quadratic function -- a far cry from the exponential growth that characterizes an intelligence explosion. </div><div><br /></div><div>Lets take a break from all of this plotting. The model we wrote down is simple enough that we can just go and solve the differential equation. Suppose we have $f(x) = x^{1-\epsilon}$ for some $\epsilon > 0$. Then the differential equation solves to give us:</div><div>\[I(t) = \left(\left(1+\epsilon t \right)^{1/\epsilon} \right)^{1-\epsilon} \]</div><div>What this means is that for <i>any</i> positive value of $\epsilon$, in this model, intelligence grows at only a polynomial rate. The only way this model gives us exponential growth is if we take $\epsilon \rightarrow 0$, and insist that $f(x) = x$ --- i.e. that the intelligence design problem does not exhibit any diminishing marginal returns at all. </div><div><br /></div><div style="text-align: center;"><b>Thoughts</b></div><div style="text-align: left;">So what do we learn from this exercise? Of course one can quibble with the details of the model, and one can believe different things about what form for the function f best approximates reality. But for me, this model helps crystallize the extent to which the "exponential intelligence explosion" story crucially relies on intelligence design being one of those rare tasks that doesn't exhibit any decreasing marginal returns on effort at all. This seems unlikely to me, and <a href="https://simplystatistics.org/2014/03/20/the-8020-rule-of-statistical-methods-development/">counter to experience</a>. </div><div style="text-align: left;"><br /></div><div style="text-align: left;">Of course, there <i>are</i> technological processes out there that do appear to exhibit exponential growth, at least for a little while. <a href="https://en.wikipedia.org/wiki/Moore%27s_law">Moore's law</a> is the most salient example. But it is important to remember that even exponential growth for a little while need not <i>seem</i> explosive at human time scales. Doubling every day corresponds to exponential growth, but so does increasing by 1% a year. To <a href="https://freedom-to-tinker.com/2018/01/04/singularity-skepticism-2-why-self-improvement-isnt-enough/">paraphrase Ed Felten</a>: our retirement plans extend beyond depositing a few dollars into a savings account, and waiting for the inevitable "wealth explosion" that will make us unimaginably rich. </div><div style="text-align: left;"><br /></div><div style="text-align: left;"><br /></div><div style="text-align: center;"><b>Postscript</b></div><div style="text-align: left;">I don't claim that anything in this post is either novel or surprising to folks who spend their time thinking about this sort of thing. There is at least <a href="https://arxiv.org/pdf/1702.08495.pdf">one paper </a>that writes down a model including diminishing marginal returns, which yields a linear rate of intelligence growth.</div><div style="text-align: left;"><br /></div><div style="text-align: left;">It is also interesting to note that in the model we wrote down, exponential growth is really a knife edge phenomenon. We already observed that we get exponential growth if $f(x) = x$, but not if $f(x) = x^{1-\epsilon}$ for any $\epsilon > 0$. But what if we have $f(x) = x^{1+\epsilon}$ for $\epsilon > 0$? In that case, we don't get exponential growth either! As Hadi Elzayn pointed out to me, <a href="https://arxiv.org/pdf/1012.1843.pdf">Osgood's Test </a>tell us that in this case, the function $I(t)$ contains an actual mathematical singularity --- it approaches an infinite value in finite time. </div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com1tag:blogger.com,1999:blog-25562705.post-60148550894013651322018-01-10T20:32:00.002-05:002018-01-10T20:32:54.201-05:00Fairness and The Problem with Exploration: A Smoothed Analysis of the Greedy Algorithm for the Linear Contextual Bandit Problem<b><u>Bandit Problems</u></b><br /><b><u><br /></u></b>"Bandit problems" are a common abstraction in machine learning. The name is supposed to evoke the image of slot machines, which are also known as "One-armed bandits" (or so I am told... Somehow nobody speaks like this in the circles I run in.) In the classic formulation, you imagine yourself standing in front of a bank of slot machines, each of which is different and might have a different distribution on payoffs. You can sequentially decide which machine's arm to pull: when you pull the arm, you get a sample from that machine's reward distribution. Your goal is to pull the arms in such a way so that your average reward approaches what it would have been had you played the optimal strategy in hindsight: i.e. always pulled the arm of the machine that had the highest mean reward. The problem is tricky because you don't know the reward distributions to start. The key feature of the problem is that in order to observe a sample from the reward distribution of a particular machine, you actually have to pull that arm and spend a turn to do it.<br /><div><br /></div><div>There are more complicated variants of this kind of problem, in which your choices may vary from round to round, but have differentiating features. For example, in the <i>linear contextual </i>bandit problem, in every round, you are presented with a number of choices, each of which is represented by some real valued vector, which may be different from round to round. You then get to choose one of them. The reward you get, corresponding to the action you choose, is random --- but its expectation is equal to some unknown linear function of the action's features. The key property of the problem is that you only get to observe the reward of the action you choose. You do not get to observe the reward you <i>would</i> have obtained had you chosen one of the other actions --- this is what makes it a <i>bandit</i> problem. The goal again is to choose actions such that your average reward approaches what it would have been had you played the optimal strategy in hindsight. In this case, with full knowledge of the underlying linear functions, the optimal strategy would simply compute the expected reward of each action, and play the action with highest expected reward (this may now be a different action at each round, since the features change). Again, the problem is tricky because you don't know the linear functions which map features to expected reward. </div><div><br /></div><div>Bandit problems are characterized by the tension between <i>exploration</i> and <i>exploitation. </i>At any given moment, the algorithm has some guess as to what the best action is. (In a linear contextual bandit problem, for example, the algorithm might just run least-squares regression on the examples it has observed rewards for: the point predictions of the regression estimate on the new actions are these best guesses). In order to be able to compete with the optimal policy, the algorithm definitely needs to (eventually) play the action it thinks is the best one, a lot of the time. This is called exploitation: the algorithm is exploiting its knowledge in order to do well. However, since the algorithm does not observe the rewards for actions it does not play, it also will generally need to <i>explore</i>. Consider someone in front of those slot machines: if he has played each machine once, he has some weak beliefs about the payoff distribution for each machine. But those beliefs have resulted from just a single sample, so they may well be very wrong. If he just forever continues to play the machine that has the highest empirical reward, he might play the same machine every day, and he will never learn more about the other machines --- even though one of them might have turned out to really have higher average reward. He has fooled himself, and because he never <i>explores</i>, he continues to be wrong forever. So optimal algorithms have to carefully balance exploration and exploitation in order to do well. </div><div><br /></div><div>There are various clever schemes for trading off exploration and exploitation, but the simplest one is called epsilon-Greedy. At every round, the algorithm flips a coin with bias epsilon. If the coin comes up heads (with probability 1-epsilon), the algorithm <i>exploits</i>: it just greedily chooses the action that it estimates to be best. If the coin comes up tails (with probability epsilon), the algorithm <i>explores: </i>it chooses an action uniformly at random. If you set epsilon appropriately, in many settings, you have the guarantee that the average reward of the algorithm will approach the average reward of the optimal policy, as time goes on. Fancier algorithms for bandit problems more smoothly interpolate between exploration and exploitation: but all of them inevitably have to manage this tradeoff. </div><div><br /><b><u>Fairness Concerns</u></b><br /><br /></div><div>(Contextual) bandit problems are not just an interesting mathematical curiosity, but actually arise all the time in important applications. Here are just a few:</div><div><ul><li>Lending: Banks (and increasingly algorithms) consider applicants for loans. They can look at applicant features, and observe the repayment history of applicants they grant loans to, but they cannot observe counterfactuals: would an applicant not given a loan have defaulted if he had been given the loan? </li><li>Parole Decisions: Judges (and increasingly algorithms) consider inmates for parole. In part, they want to predict which inmates will go on to re-offend if released, and <i>not</i> release those inmates. But it is not possible to observe the counterfactual: would an inmate who was not released have gone on to commit a crime if he had been released? </li><li>Predictive Policing: Police chiefs (and increasingly algorithms) consider where in their city they want to deploy their police. In part, they want to predict where crimes will occur, so they can deploy a heavier police presence in those areas. But they also disproportionately <i>observe</i> crimes in the areas in which police are deployed.</li><li>Sequential Clinical Trials: Certain kinds of drugs affect patients differently, depending on their genetic markers. But for a new drug, the relationship might be unknown. As patients show up, they can be assigned to different clinical trials, corresponding to different drugs --- but we cannot observe the counterfactual: how would a patient have reacted to a drug she was not given? </li></ul><div>I picked these four examples (rather than the more commonly used example of ad targeting) because in each of the above examples, the decision made by the algorithm has an important effect on someone's life. This raises issues of <i>fairness</i>, and as we will see, these fairness questions relate to exploration in at least two different ways. </div><div><br /></div><div>First, there is an issue that was recently raised by <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2846909">Bird, Barocas, Crawford, Diaz, and Wallach</a>: that exploring can be <i>unfair</i> to the individuals who have the misfortune of being present during the exploration rounds. Consider the example of sequential clinical trials: if a patient shows up on an "exploitation" round, then she is given the treatment that is believed to be the best for her, using a best effort estimate given the information available. But if she shows up during an "exploration" round, she will be given a random treatment --- generally, one that current evidence suggests is not the best for her. Is this fair to her? What if her life depends on the treatment? Exploration is explicitly sacrificing her well-being, for the possible good of future individuals, who might be able to benefit from what we learned from the exploration. It can be that when we are dealing with important decisions about peoples lives, we don't want to sacrifice the welfare of an individual for the good of others. Certainly, our notional patient would prefer not to show up on an exploration round. In various other settings, we can also imagine exploration being repugnant, even though it is in principle necessary for learning. Can we (for example) randomly release inmates on parole, even if we believe them to be high risks for committing more violent crimes? </div></div><div><br /></div><div>There is another, conflicting concern: if we do not explore, we might not correctly learn about the decisions we have to make. And there are a number of reasons we might expect to see insufficient exploration. Exploration is necessary to maximize long-term reward, but decision makers might be myopic. For example, the loan officers actually making lending decisions might be more interested in maximizing their annual bonuses than maximizing the long-term profits of the bank. Even the CEO might be more interested in quarterly share prices. But myopic decision makers won't explore (tangent: We had <a href="https://arxiv.org/abs/1705.02321">a paper at EC</a> thinking about how one might incentivize myopic decision makers to nevertheless be meritocratically fair). The algorithms in use in many settings might also not have been designed properly --- if our learning algorithms don't explicitly take into account the bandit nature of the problem, and just treat it as a supervised classification problem, then they won't explore --- and this kind of mistake is probably extremely common. And finally, as we argued above, we might believe that it is simply not "fair" to explore, and so we intentionally avoid it. But a lack of exploration (and the resulting failure to properly learn) can itself be a source of unfairness. The "feedback loops" that result from a lack of exploration have been blamed by <a href="http://onlinelibrary.wiley.com/doi/10.1111/j.1740-9713.2016.00960.x/full">Lum and Isaac</a> and by <a href="https://arxiv.org/pdf/1706.09847.pdf">Ensign, Friedler, Neville, Scheidegger, and Venkatasubramanian</a> as a primary source of unfairness in predictive policing. (See <a href="https://algorithmicfairness.wordpress.com/2018/01/05/models-need-doubt-the-problematic-modeling-behind-predictive-policing/">Suresh's recent blog post</a>). Such algorithms can over-estimate crime in the poor neighborhoods in which police are deployed, and underestimate crime in the rich neighborhoods. If they don't explore to correct these mis-estimates, they will deploy more police to the poor neighborhoods, and fewer to the rich neighborhoods, which only exacerbates the data collection problem. </div><div><br /><b><u>Our New Paper</u></b><br /><br /></div><div>These two concerns both lead us to wonder how bad things need be if a decision maker <i>doesn't</i> explore, and instead simply runs a greedy algorithm, that <i>exploits</i> at every round. Maybe this is because we believe that greedy algorithms are already being run in many cases, and we want to know how much of a risk we are at for developing pernicious feedback loops. Or maybe we want to run a greedy algorithm by design, because we are in a medical or legal setting in which exploration is unacceptable. This is the question we consider in <a href="https://arxiv.org/abs/1801.03423">a new paper</a>, joint with <a href="https://www.cis.upenn.edu/~kannan/">Sampath Kannan</a>, <a href="http://jamiemorgenstern.com/">Jamie Morgenstern</a>, <a href="http://www.bowaggoner.com/">Bo Waggoner</a>, and <a href="https://www-users.cs.umn.edu/~zsw/">Steven Wu</a>. (P.S. <a href="http://www.bowaggoner.com/">Bo</a> is on the job market right now!)</div><div><br /></div><div>Specifically, we consider the linear contextual bandit problem, described at the beginning of this post. A decision maker must choose amongst a set of actions every day, each of which is endowed with a vector of features. The reward distribution for each action is governed by an unknown <i>linear</i> function of the features. In this case, the greedy algorithm is simply the algorithm that maintains ordinary least squares regression estimates for each action, and always plays the action that maximizes its current point prediction of the reward, using its current regression estimate. </div><div><a href="https://arxiv.org/abs/1704.09011"><br /></a></div><div>Motivated in part by the problem with exploration in sequential drug trials, <a href="https://arxiv.org/abs/1704.09011">Bastani, Bayati, and Khosravi</a> previously studied a two-action variant of this problem, and showed that when the features are drawn stochastically from a distribution satisfying certain strong assumptions, then the greedy algorithm works well: its reward approaches that of the optimal policy, without needing exploration! We take their result as inspiration, and prove a theorem of this flavor under substantially weaker conditions (although our model is slightly different, so the results are technically incomparable). </div><div><br /></div><div>We consider a model in which the number of actions can be arbitrary, and give a <i>smoothed analysis</i>. What that means is we don't require that the actions or their features are drawn from any particular distribution. Instead, we let them be chosen by an adversary, who knows exactly how our algorithm works, and can be arbitrarily sneaky in his attempt to cause our algorithm to fail to learn. Of course, if we stopped there, then the result would be that the greedy algorithm can be made to catastrophically fail to learn with constant probability: it has long been known that exploration is necessary in the worst case. But our adversary has a slightly shaky hand. <i>After</i> he chooses the actions for a given round, the features of those actions are perturbed by a small amount of Gaussian noise, independently in each coordinate. What we show is that this tiny amount of noise is sufficient to cause the greedy algorithm to succeed at learning: it recovers regret bounds (regret is the difference between the cumulative reward of the greedy algorithm, and what the optimal policy would have done) that are close to optimal, up to an inverse polynomial factor of the standard deviation of the Gaussian noise. (The regret bound must grow with the inverse of the standard deviation of the noise in any smoothed analysis, since we know that if there is no noise, the greedy algorithm doesn't work...) </div><div><br /></div><div>The story is actually more nuanced: we consider two different models, derive qualitatively different bounds in each model, and prove a separation: see <a href="https://arxiv.org/abs/1801.03423">the paper</a> for details. But the punchline is that, at least in linear settings, what we can show is that "generically" (i.e. in the presence of small perturbations), fast learning is possible in bandit settings, even without exploration. This can be taken to mean that in settings in which exploration is repugnant, we don't have to do it --- and that perhaps pernicious feedback loops that can arise when we fail to explore shouldn't be expected to persist for a long time, if the features we observe are a little noisy. Of course, everything we prove is in a linear setting. We still don't know the extent to which these kinds of smoothed analyses carry over into non-linear settings. Understanding the necessity of exploration in more complex settings seems like an important problem with real policy implications. </div><div><br /></div><div></div><div><br /></div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-77650911788845927562017-12-17T20:52:00.000-05:002017-12-17T20:53:13.990-05:00Adaptive Data Analysis Class NotesAdam Smith and I both taught a PhD seminar this semester (at BU and Penn respectively) on adaptive data analysis. We collaborated on the course notes, which can be found here: <a href="https://adaptivedataanalysis.com/lecture-schedule-and-notes/">https://adaptivedataanalysis.com/lecture-schedule-and-notes/</a><br /><div><br /></div><div>As part of their final project, students will be writing lecture notes for papers that we didn't have time to cover (listed here: <a href="https://adaptivedataanalysis.com/more-reading/">https://adaptivedataanalysis.com/more-reading/</a> ). I'll post those as they are turned in. </div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com1tag:blogger.com,1999:blog-25562705.post-20305990434940212012017-11-15T15:09:00.000-05:002017-12-18T13:13:09.997-05:00Between "statistical" and "individual" notions of fairness in Machine LearningIf you follow the fairness in machine learning literature, you might notice after awhile that there are two distinct families of fairness definitions:<br /><br /><ol><li>Statistical definitions of fairness (sometimes also called <i>group</i> fairness), and</li><li>Individual notions of fairness. </li></ol><div>The statistical definitions are far-and-away the most popular, but the individual notions of fairness offer substantially stronger semantic guarantees. In this post, I want to dive into this distinction a little bit. Along the way I'll link to some of my favorite recent fairness papers, and end with a description of a recent paper from our group which tries to get some of the best properties of both worlds.</div><div><br /></div><div><b><u>Statistical Definitions of Fairness</u></b></div><div>At a high level, statistical definitions of fairness partition the world into some set of "protected groups", and then ask that some statistical property be approximately equalized across these groups. Typically, the groups are defined via some high level sensitive attribute, like race or gender. Then, statistical definitions of fairness ask that some relevant statistic about a classifier be equalized across those groups. For example, we could ask that the rate of positive classification be equal across the groups (this is sometimes called <i>statistical parity). </i>Or, we could ask that the false positive and false negative rates be equal across the groups (This is what <a href="http://papers.nips.cc/paper/6374-equality-of-opportunity-in-supervised-learning.pdf">Hardt, Price, and Srebro</a> call "Equalized Odds"). Or, we could ask that the positive predictive value (also sometimes called calibration) be equalized across the groups. These are all interesting definitions, and there are very interesting <a href="https://arxiv.org/abs/1703.00056">impossibility</a> <a href="https://arxiv.org/abs/1609.05807">results </a>that emerge if you think you might want to try and satisfy all of them simultaneously.</div><div><br /></div><div>These definitions are attractive: first of all, you can easily check whether a classifier satisfies them, since verifying that these fairness constraints hold on a particular distribution simply involves estimating some expectations, one for each protected group. It can be <a href="https://arxiv.org/abs/1702.06081">computationally hard</a> to find a classifier that satisfies them, while minimizing the usual convex surrogate losses --- but computational hardness pervades all of learning theory, and hasn't stopped the practice of machine learning. Already there are a number of practical algorithms for learning classifiers subject to these statistical fairness constraints --- this <a href="http://fatml.mysociety.org/media/documents/reductions_approach_to_fair_classification.pdf">recent paper</a> by Agarwal et al. is one of my favorites. </div><div><br /></div><div><i>Semantics </i></div><div>But what are the semantics of these constraints, and why do they correspond to "fairness"? You can make a different argument for each one, but here is the case for equalizing false positive and negative rates across groups (equalized odds), which is one of my favorites: </div><div><br /></div><div>You can argue (making the <i>big</i> assumption that the data is not itself already corrupted with bias --- see <a href="https://arxiv.org/abs/1609.07236">this paper</a> by Friedler et al. for a deep dive into these assumptions...) that a classifier potentially does harm to an individual when it misclassifies them. If the (say) false positive rate is higher amongst black people than white people, then this means that if you perform the thought experiment of imagining yourself as a uniformly random black person with a negative label, the classifier is more likely to harm you than if you imagine yourself as a uniformly random white person with a negative label. On the other hand, if the classifier equalizes false positive and negative rates across populations, then behind the "veil of ignorance", choosing whether you want to be born as a uniformly random black or white person (conditioned on having a negative label), all else being equal, you should be indifferent!</div><div><br /></div><div><i>Concerns</i></div><div>However, in this thought experiment, it is crucial that you are a uniformly random individual from the population. If you know some fact about yourself that makes you think you are not a uniformly random white person, the guarantee can lack bite. Here is a simple example:</div><div><br /></div><div>Suppose we have a population of individuals, with two features and a label. Each individual has a race (either black or white) and a gender (either male or female). The features are uniformly random and independent. Each person also has a label (positive or negative) that is also uniformly random, and independent of the features. We can define four natural protected groups: "Black people', "White people", "Men", and "Women". </div><div><br /></div><div>Now suppose we have a classifier that labels an individual as positive if and only if they are either a black man or a white woman. Across these four protected groups, this classifier appears to be fair: the false positive rate and false negative rate are all exactly 50% on all four of the protected groups, so it satisfies equalized odds. But this hides a serious problem: on two subgroups (black men and white women), the false positive rate is 100%! If being labelled positive is a bad thing, you would not want to be a random (negative) member of those sub-populations.</div><div><br /></div><div>Of course, we could remedy this problem by simply adding more explicitly protected subgroups. But this doesn't scale well: If we have d protected binary features, there are 2^(2^d) such subgroups that we can define. If the features are real valued, things are even worse, and we quickly get into issues of overfitting (see the next section). </div><div><br /></div><div><b><u>Individual Definitions of Fairness</u></b></div><div>At a high level, the problem with statistical definitions of fairness is that they are defined with respect to group averages, so if you are not an "average" member of your group, they don't promise you anything. Individual definitions of fairness attempt to remedy this problem by asking for a constraint that binds at the individual level. The first attempt at this was in the seminal paper <a href="https://dl.acm.org/citation.cfm?id=2090255">"Fairness Through Awareness"</a>, which suggested that fairness should mean that "similar individuals should be treated similarly". Specifically, if the algorithm designer knows the correct metric by which individual similarity should be judged, the constraint requires that individuals who are close in that metric should have similar probabilities of any classification outcome. This is a semantically very strong definition. It hasn't gained much traction in the literature yet, because of the hard problem of specifying the similarity metric. But I expect that it will be an important definition going forward --- there are just some obstacles that have to be overcome. I've been thinking about it a lot myself. </div><div><br /></div><div>Another definition of individual fairness is one that my colleagues and I at Penn introduced in <a href="https://arxiv.org/abs/1605.07139">this paper</a>, which we have taken to calling "Weakly Meritocratic Fairness". I have previously blogged about it <a href="https://aaronsadventures.blogspot.com/2016/05/fairness-in-learning.html">here</a>. We define it in a more general context, and in an online setting, but it makes sense to think about what it means in the special case of batch binary classification as well. In that case, it reduces to three constraints:</div><div><ol><li>For any two individuals with a negative label, the false positive rate on those individuals must be equal</li><li>For any two individuals with a positive label, the false negative rate on those individuals must be equal</li><li>For any pair of individuals A and B such that A has a negative label, and B has a positive label, the true positive rate on B can't be lower than the false positive rate on A. (Assuming that positive is the more desirable label --- otherwise this is reversed). </li></ol><div>Again, we are talking about false positive rates --- but now there is no distribution --- i.e. nothing to take an average over. Instead, the constraints bind on every pair of individuals. As a result, the "rate" we are talking about is calculated only over the randomness of the classifier itself. </div></div><div><br /></div><div>This constraint in particular implies that false positive rates are equal across any sub-population that you might define, even ex-post! Problem solved! Why don't we all just use this definition of fairness? Here is why:</div><div><br /></div><div><i>Concerns</i>:</div><div>Weakly meritocratic fairness is extremely similar (identical, except for the added condition 3) to asking for equalized odds fairness on the (potentially infinitely large) set of "protected groups" corresponding to singletons --- everyone forms their own protected group! As a result, you shouldn't hope to be able to satisfy a fairness definition like this without making some assumption on the data generating process. Even if on your sample of data, it <i>looks like</i> you are satisfying this definition of fairness, you are overfitting --- the complexity of this class of groups is too large, and your in-sample "fairness" won't generalize out of sample. If you <i>are</i> willing to make assumptions on the data generating process, then you can do it! In our original paper, we show how to do it if you assume the labels obey a linear relationship to the features. But assumptions of this sort generally won't hold exactly in practice, which makes this kind of approach difficult to implement in practical settings. </div><div><br /></div><div>The "Fairness Through Awareness" definition at a high level suffers from the same kind of problem: you can only use it if you make a very strong assumption (namely that you have what everyone agrees is the "right" fairness metric). And this is the crux of the problem with definitions of individual fairness: they seem to require such strong assumptions, that we cannot actually realize them in practice. </div><div><br /></div><div><b><u>A Middle Ground</u></b></div><div>Asking for statistical fairness across a small number of coarsely defined groups leaves us open to unfairness on structured subgroups we didn't explicitly designate as protected (what you might call "Fairness Gerrymandering"). On the other hand, asking for statistical fairness across every possible division of the data that can be defined ex-post leaves us with an impossible statistical problem. (Consider, that every imperfect classifier could be accused of being "unfair" to the subgroup that we define, ex-post, to be the set of individuals that the classifier misclassifies! But this is just overfitting...)</div><div><br /></div><div>What if we instead ask for statistical fairness across exponentially many (or infinitely many) subgroups, defined over a set of features we think should be protected, but ask that this family of subgroups itself has bounded VC-dimension? This mitigates the statistical problem --- we can now in principle train "fair" classifiers according to this definition without worrying about overfitting, assuming we we have enough data (proportional to the VC-dimension of the set of groups we want to protect, and the set of classifiers we want to learn). And we can do this without making any assumptions about the data. It also mitigates the "Fairness Gerrymandering" problem --- at least now, we can explicitly protect an enormous number of detailed subgroups, not just coarsely defined ones. </div><div><br /></div><div>This is what we (<a href="http://www.cis.upenn.edu/~mkearns/">Michael Kearns</a>, <a href="https://sethstatistics.wordpress.com/">Seth Neel</a>, <a href="https://www-users.cs.umn.edu/~zsw/">Steven Wu</a>, and I) propose in our <a href="https://arxiv.org/abs/1711.05144v1">new paper</a>. In most of the paper, we investigate the computational challenges surrounding this kind of fairness constraint, when the statistical fairness notion we want is equality of false positive rates, false negative rates, or classification rates (statistical parity):</div><div><ul><li>First, it is no longer clear how to even <i>check</i> whether a fixed classifier satisfies a fairness constraint of this sort, without explicitly enumerating all of the protected groups (and recall, there might now be exponentially or even uncountably infinitely many such subgroups). We call this the <i>Auditing</i> problem. And indeed, in the worst case, this is a hard problem: we show that it is equivalent to weak agnostic learning, which brings with it a long list of computational hardness results from learning theory. It is hard to audit even for simple subgroup structures, definable by boolean conjunctions over features, or linear threshold functions. However, this connection also suggests an algorithmic approach to auditing. The fact that learning linear separators is NP hard in the worst case hasn't stopped us from doing this all the time, with simple heuristics like logistic regression and SVMs, as well as more sophisticated techniques. These same heuristics can be used to solve the auditing problem. </li><li>Going further, lets suppose those heuristics work --- i.e. we have oracles which can optimally solve agnostic learning problems over some collection of classifiers C, and can optimally solve the auditing problem over some class of subgroups G. Then we give an algorithm that only has to maintain small state, and provably converges to the optimal distribution over classifiers in C that equalizes false positive rates (or false negative rates, or classification rates...) over the groups G. Our algorithm draws inspiration from the Agarwal et al. paper: "<a href="http://fatml.mysociety.org/media/documents/reductions_approach_to_fair_classification.pdf">A Reductions Approach to Fair Classification</a>". </li><li>And we can run these algorithms! We use a simple linear regression heuristic to implement both the agnostic learning and auditing "oracles", and run the algorithm to learn a distribution over linear threshold functions (defined over 122 attributes) that approximately equalizes false positive rates across every group definable by a linear threshold function over 18 real valued racially associated attributes, in the "Communities and Crime" dataset. It seems to work and do well! </li></ul></div><div><br /></div><div><b><u>In Conclusion...</u></b></div><div>I've long been bothered by the seemingly irreconcilable gap between individual and group notions of fairness. The individual notions of fairness have the right semantics, but they are unimplementable. The group notions of fairness promise something too weak. Going forward, I think these two schools of thought on fairness have to be reconciled. I think of our work as a small step in that direction.<br /><br /><div style="text-align: center;"><b>Michael recorded a short talk about this work, which you can watch on YouTube: <a href="https://www.youtube.com/watch?v=AjGQHJ0FKMg">https://www.youtube.com/watch?v=AjGQHJ0FKMg</a></b></div></div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com1tag:blogger.com,1999:blog-25562705.post-82834665498865289382017-10-16T09:49:00.002-04:002017-10-16T09:52:32.284-04:00Call for Nominations for the SIGecom Doctoral Dissertation Award<span class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: "arial" , sans-serif; font-size: 13px;">The SIGecom Doctoral Dissertation Award recognizes an outstanding dissertation in the field of economics and computer science. The award is conferred annually at the ACM Conference on Economics and Computation and includes a plaque, complimentary conference registration, and an honorarium of $1,500. A plaque may further be given to up to two runners-up. No award may be conferred if the nominations are judged not to meet the standards for the award.</span><br /><br class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: arial, sans-serif; font-size: 13px;" /><span class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: "arial" , sans-serif; font-size: 13px;">To be eligible, a dissertation must be on a topic related to the field of economics and computer science and must have been defended successfully during the calendar year preceding the year of the award presentation.</span><br /><br class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: arial, sans-serif; font-size: 13px;" /><span class="m_4977556430097751528gmail-m_-8094567887141969947gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: arial, sans-serif; font-size: 13px;">The next SIGecom Doctoral Dissertation Award will be given for dissertations defended in 2017. Nominations are due by the <span class="aBn" data-term="goog_1480864648" style="border-bottom: 1px dashed rgb(204, 204, 204); position: relative; top: -2px; z-index: 0;" tabindex="0"><span class="aQJ" style="position: relative; top: 2px; z-index: -1;">March 31, 2018</span></span>, and must be submitted by email with the subject "SIGecom Doctoral Dissertation Award" to<span class="m_4977556430097751528gmail-m_-8094567887141969947gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434inbox-inbox-Apple-converted-space"> </span></span><span class="m_4977556430097751528gmail-m_-8094567887141969947gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: arial, sans-serif; font-size: 13px;">the awards committee at<span class="m_4977556430097751528gmail-m_-8094567887141969947gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434inbox-inbox-Apple-converted-space"> </span><a class="m_4977556430097751528gmail-m_-8094567887141969947gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" href="mailto:sigecom-awards-diss@acm.org" style="color: #1155cc;" target="_blank">sigecom-awards-diss@acm.org</a></span><span class="m_4977556430097751528gmail-m_-8094567887141969947gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: arial, sans-serif; font-size: 13px;"><wbr></wbr>. A dissertation may be nominated simultaneously for both the SIGecom Doctoral Dissertation Award and the ACM Doctoral Dissertation Award.</span><br /><br class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: arial, sans-serif; font-size: 13px;" /><span class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: "arial" , sans-serif; font-size: 13px;">Nominations may be made by any member of SIGecom, and will typically come from the dissertation supervisor. Self-nomination is not allowed. Nominations for the award must include the following, preferably in a single PDF file:</span><br /><br class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: arial, sans-serif; font-size: 13px;" /><span class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: "arial" , sans-serif; font-size: 13px;">1. A two-page summary of the dissertation, written by the nominee, including bibliographic data and links to publicly accessible versions of published papers based primarily on the dissertation.</span><br /><span class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: "arial" , sans-serif; font-size: 13px;">2. An English-language version of the dissertation.</span><br /><span class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: "arial" , sans-serif; font-size: 13px;">3. An endorsement letter of no more than two pages by the nominator, arguing the merit of the dissertation, potential impact, and justification of the nomination. This document should also certify the dissertation defense date.</span><br /><span class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: "arial" , sans-serif; font-size: 13px;">4. The names, email addresses, and affiliations of at least two additional endorsers.</span><br /><br class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: arial, sans-serif; font-size: 13px;" /><span class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: "arial" , sans-serif; font-size: 13px;">The additional endorsement letters themselves should be emailed directly to </span><a class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" href="mailto:mailto:sigecom-awards-diss@acm.org" style="background-color: white; color: #1155cc; font-family: arial, sans-serif; font-size: 13px;" target="_blank">sigecom-awards-diss@acm.org</a><span class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: "arial" , sans-serif; font-size: 13px;"><wbr></wbr>, by the same deadline. These endorsements should be no longer than 500 words, and should specify the relationship of the endorser to the nominee, contributions of the dissertation, and its potential impact on the field.</span><br /><br class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: arial, sans-serif; font-size: 13px;" /><span class="m_8745097540625121615gmail-m_-8759336033224474935m_1006650683456301089gmail-m_94279031666006434gmail_msg" style="background-color: white; color: #212121; font-family: "arial" , sans-serif; font-size: 13px;">It is expected that a nominated candidate, if selected for the award, will attend the next ACM Conference on Economics and Computation to accept the award and give a presentation on the dissertation work. The cost of attending the conference is not covered by the award, but complimentary registration is provided.</span>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-3227076218129484382017-07-16T13:08:00.003-04:002017-07-16T13:08:36.727-04:00Submit your papers to WWW 2018Jennifer Wortman Vaughan and I are the track chairs for the the "Web Economics, Monetization, and Online Markets" track of WWW 2018. The track name is a little unwieldy -- we tried to change it to "Economics and Markets" -- but the focus should be of interest to many in the AGT, theory, and machine learning communities. See the call for papers here: <a href="https://www2018.thewebconf.org/call-for-papers/research-tracks-cfp/web-economics/">https://www2018.thewebconf.org/call-for-papers/research-tracks-cfp/web-economics/</a> We have a great PC, and the topics of interests include (amongst many other things), "Economics of Privacy" and "Fairness in Economic Environments".Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-22207676040616712592016-11-25T15:22:00.002-05:002016-11-28T18:14:57.495-05:00January Fairness Workshop at PennAt the beginning of the semester, I mentioned that after the law school's <a href="https://www.law.upenn.edu/institutes/ppr/optimizing-government-project/">semester of events</a> (click for videos) on fairness, machine learning, and the law, we would host a technical workshop on recent work on fairness in machine learning.<br /><br />We have now finished putting together the program, which will be terrific. The workshop will take place here at Penn from January 19-20th. Take a look at our great line-up of speakers here: <a href="https://sites.google.com/view/fairnessconfererencepenn">https://sites.google.com/view/fairnessconfererencepenn</a><br /><br />The event is open to the public, but registration is required.Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-1276740762591491282016-10-24T10:56:00.001-04:002016-10-24T10:56:48.500-04:00Designing the Digital EconomyI'm on a train to New Haven, where I'll be giving a guest lecture (together with <a href="http://solon.barocas.org/">Solon Barocas</a>) in Glen Weyl's class, "<a href="https://www.dropbox.com/s/4l417liqgnwfihe/DDE_syllabus.docx?dl=0">Designing the Digital Economy</a>" (n.b. I need to get advice from Glen about how to get as good <a href="http://www.nytimes.com/2016/09/04/technology/goodbye-ivory-tower-hello-silicon-valley-candy-store.html">publicity</a> for my classes...)<br /><br />Solon and I will be sharing the 3 hour class, talking about fairness in machine learning, starting at 2:30. Pop by if you are around -- otherwise, <a href="http://www.cis.upenn.edu/~aaroth/Papers/fairtradeoffs.pptx">here</a> are my slides.Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-14134659169001439402016-09-14T09:46:00.005-04:002016-09-22T09:38:27.686-04:00Semester on Fairness and Algorithms at PennThis year, the "Fels Policy Research Initiative" is funding two exciting events, both related to fairness and machine learning. The first, joint between the law school and statistics, is called "Optimizing Government", and will host a series of 4 seminars over the course of this semester touching on technical and legal aspects of fairness.<br /><br />I will be speaking at the first one, introducing the basics of Machine Learning and scenarios in which its use can lead to inadvertent discrimination. My inimitable colleague Richard Berk (who actually builds models used to predict criminal recidivism used by the state of Pennsylvania) will be offering his comments following my talk.<br /><br />The second seminar will provide a panel discussion on what the law demands in terms of "fair and equal treatment", and how it relates to the use of machine learning. The panelists will come from Philosophy, Political Science, and Law.<br /><br />The third seminar will be given by our excellent Warren Center postdoc Jamie Morgenstern, and will focus on technical solutions to the problem of unfairness in machine learning, and how it can be squared with learning the optimal policy in online decision making settings.<br /><br />Finally, the fourth seminar will be an exciting keynote delivered by the current Deputy U.S. CTO Ed Felten on uses of machine learning in government.<br /><br />I believe the talks will be recorded.<br /><br /><br />We will begin next semester with the second Fels sponsored workshop, organized between computer science and economics -- a 2 day intensive workshop exploring current research on technical and economic solutions to addressing unfairness in decision making. More details to come.<br /><br />Below is the schedule for this semester:<br /><span style="background-color: white; color: #222222; font-family: "arial" , sans-serif; font-size: 12.8px;"><br /></span><span style="background-color: white; color: #222222; font-family: "arial" , sans-serif; font-size: 12.8px;">The “Optimizing Government” interdisciplinary research collaboration, supported by the Fels Policy Research Initiative, will hold the following workshops this fall:</span><br /><br /><blockquote style="background-color: white; border: none; color: #222222; font-family: arial, sans-serif; font-size: 12.8px; margin: 0px 0px 0px 40px; padding: 0px;"><b><span class="aBn" data-term="goog_1970176626" style="border-bottom: 1px dashed rgb(204, 204, 204); position: relative; top: -2px; z-index: 0;" tabindex="0"><span class="aQJ" style="position: relative; top: 2px; z-index: -1;">Thursday, 9/22/16</span></span>: What is Machine Learning (and Why Might it be Unfair)?</b><i>Fundamentals of machine learning with a focus on what makes it different from traditional statistical analysis and why it might lead to unfair outcomes.</i>Speakers: Aaron Roth (Penn Computer Science), with comments from Richard Berk (Wharton Statistics; Chair of SAS Criminology)<br /><div><br /></div><div><b><span class="aBn" data-term="goog_1970176627" style="border-bottom: 1px dashed rgb(204, 204, 204); position: relative; top: -2px; z-index: 0;" tabindex="0"><span class="aQJ" style="position: relative; top: 2px; z-index: -1;">Thursday, 10/6/16</span></span>: What Does Fair and Equal Treatment Demand?</b></div><div><i>Current legal and moral norms about fairness and equal protection as they relate to the use of machine learning in government.</i></div><div>Speakers: Panel featuring Samuel Freeman (Penn Philosophy), Nancy Hirschmann (Penn Political Science), and Seth Kreimer (Penn Law)</div><div><br /></div><div><b><span class="aBn" data-term="goog_1970176628" style="border-bottom: 1px dashed rgb(204, 204, 204); position: relative; top: -2px; z-index: 0;" tabindex="0"><span class="aQJ" style="position: relative; top: 2px; z-index: -1;">Thursday, 11/3/16</span></span>: Fairness and Performance Trade-Offs in Machine Learning</b></div><div><i>Technical solutions to fairness challenges raised by machine learning and their impacts on algorithm effectiveness.</i></div><div>Speaker: Jamie Morgenstern (Penn Computer Science)</div><div><br /></div><div><b><span class="aBn" data-term="goog_1970176629" style="border-bottom: 1px dashed rgb(204, 204, 204); position: relative; top: -2px; z-index: 0;" tabindex="0"><span class="aQJ" style="position: relative; top: 2px; z-index: -1;">Thursday, 11/17/16</span></span>: Keynote on Machine Learning and Government</b></div><div><i>How to use machine learning for a variety of administrative and policy functions, and findings from a White House initiative on artificial intelligence in government.</i></div><div>Speaker: Ed Felten, Deputy U.S. CTO (Invited)</div></blockquote><div style="background-color: white;"><div style="color: #222222; font-family: arial, sans-serif; font-size: 12.8px;"><br /></div><div style="color: #222222; font-family: arial, sans-serif; font-size: 12.8px;"><b>Each workshop will take place from <u><span class="aBn" data-term="goog_1970176630" style="border-bottom: 1px dashed rgb(204, 204, 204); position: relative; top: -2px; z-index: 0;" tabindex="0"><span class="aQJ" style="position: relative; top: 2px; z-index: -1;">4:30-6:00 pm</span></span> in Gittis 213 (Penn Law)</u>.</b> You can enter the Law School through its main entrance at 3501 Sansom Street.</div><div style="color: #222222; font-family: arial, sans-serif; font-size: 12.8px;"><br /></div><b style="color: #222222; font-family: arial, sans-serif; font-size: 12.8px;">EDIT: The Optimizing Government Project now has a website: </b><span style="color: #222222; font-family: arial, sans-serif;"><span style="font-size: 12.8px;"><b><a href="https://www.law.upenn.edu/institutes/ppr/optimizing-government-project/">https://www.law.upenn.edu/institutes/ppr/optimizing-government-project/ </a>and the talks will be livestreamed here:<a href="https://www.law.upenn.edu/institutes/ppr/optimizing-government-project/media.php"> https://www.law.upenn.edu/institutes/ppr/optimizing-government-project/media.php</a></b></span></span></div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-74237352911181202432016-08-24T09:07:00.002-04:002016-08-24T09:07:48.711-04:00Call for Papers: Second Workshop on Adaptive Data AnalysisAs part of NIPS 2016, we will be running the second annual workshop on adaptive data analysis. Last year's workshop was a big hit. As a new addition this year, we are soliciting submitted contributions in addition to invited speakers. The call for papers is below. If you are working on relevant work, definitely submit it to our workshop! More information at: <a href="http://wadapt.org/">http://wadapt.org/</a><div><br /></div><br />Call for Papers<br /><br /><br />The overall goal of WADAPT is to stimulate the discussion on theoretical analysis and practical aspects of adaptive data analysis. We seek contributions from different research areas of machine learning, statistics and computer science. Submissions focused on a particular area of application are also welcome.<br /><br />Submissions will undergo a lightweight review process and will be judged on originality, relevance, clarity, and the extent to which their presentation can stimulate the discussion between different communities at the workshop. Submissions may describe either novel work (completed or in progress), or work already published or submitted elsewhere provided that it first appeared after September 1, 2015.<br /><br />Authors are invited to submit either a short abstract (2-4 pages) or a complete paper by Oct 15, 2016. Information about previous publication, if applicable, should appear prominently on the first page of the submission. Abstracts must be written in English and be submitted as a single PDF file at <a href="https://easychair.org/conferences/?conf=wadapt2016">EasyChair</a>.<br /><br />All accepted abstracts will be presented at the workshop as posters and some will be selected for an oral presentation. The workshop will not have formal proceedings, and presentation at the workshop is not intended to preclude later publication at another venue.<br /><br />Those who need to receive a notification before the NIPS early registration deadline (Oct 6, 2016) should submit their work by the early submission deadline of Sept 23, 2016.<br /><br />Important Dates:<br /><br /><br />Submission deadlines. Early: Sep 23, 2016; Regular: Oct 25, 2016. Submit at <a href="https://easychair.org/conferences/?conf=wadapt2016">EasyChair</a>.<br />Notification of acceptance. Early: Oct 3, 2016, Regular: Nov 7, 2016.<br />Workshop: December 9, 2016<br /><br /><br /><br />Specific topics of interest for the workshop include (but are not limited to):<br /><br /><br />Selective/post-selection inference<br />Sequential/online false discovery rate control<br />Algorithms for answering adaptively chosen data queries<br />Computational and statistical barriers to adaptive data analysis<br />Stability measures and their applications to generalization<br />Information-theoretic approaches to generalizationAaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-70397341264537680572016-06-04T17:18:00.002-04:002016-06-04T17:18:33.352-04:00Machine Learning PostdocMy brand new colleague Shivani Agarwal is in the market for a postdoc; the announcement is below. One of the targeted areas is machine learning and economics. Whoever takes this position will join a growing group of exceptional postdocs in this area at Penn, including Jamie Morgenstern and Bo Waggoner.<br /><br /><br /><br /><pre style="white-space: pre-wrap; word-wrap: break-word;">Postdoctoral Position in Machine Learning at UPenn<br /><br />Applications are invited for a postdoctoral position in machine learning in the Department of Computer and Information Science at the University of Pennsylvania. The position is expected to begin in Fall 2016, and is for a period of up to two years (with renewal in the second year contingent on performance in the first year). Applications in all areas of machine learning will be considered, with special emphasis on the following areas: ranking and choice modeling; connections between machine learning and economics; and learning of complex structures.<br /><br />The ideal candidate will demonstrate both ability for independent thinking and interest in co-mentoring of graduate students. The candidate will work primarily with Shivani Agarwal (joining UPenn faculty in July 2016), but will also have opportunities to collaborate with other faculty in machine learning and related areas at UPenn, including Michael Kearns, Daniel Lee, Sasha Rakhlin, Aaron Roth, Lyle Ungar, and other faculty.<br /><br />UPenn is located in the vibrant city of Philadelphia, which is known for its rich culture, history, museums, parks, and restaurants. It is less than 1.5 hrs by train to NYC, 1.5 hrs by flight to Boston, 2 hrs by train to Washington DC, and 40 mins by train to Princeton. For more details about the CIS department at UPenn, see:<br /><br />http://www.cis.upenn.edu/<br /><br />To apply, send the following materials in an email titled “Application for Postdoctoral Position” to <ashivani seas.upenn.edu=""> by June 17, 2016:<br /><br />- curriculum vitae<br />- 2-page statement of research interests and goals<br />- 3 representative publications or working papers<br />- 3 letters of recommendation (to be sent separately by the same date)<br /><br />Shortlisted candidates will be invited for a short meeting/interview at ICML/COLT in NYC during June 23-26 (in your email, please indicate your availability for this).<br /></ashivani></pre><div><br /></div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-21722146347459003342016-05-24T09:18:00.001-04:002016-05-24T09:18:55.218-04:00Fairness in LearningThe very real problem of (un)fairness in algorithmic decision making in general, and machine learning in particular seems to have finally reached the forefront of public attention. Every day there is a new popular article about the topic. Just in the last few weeks, we have seen articles in the Times about <a href="http://www.nytimes.com/2016/05/12/technology/facebooks-bias-is-built-in-and-bears-watching.html">built in bias in facebook</a>, and an in-depth <a href="https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing">ProPublica study about racial bias in statistical models for predicting criminal recidivism.</a> Earlier this month, the <a href="https://www.whitehouse.gov/sites/default/files/microsites/ostp/2016_0504_data_discrimination.pdf">White House released a report on the challenges in promoting fairness in Big Data</a>.<br /><br />The tricky thing is saying something concrete and technical about this problem -- even defining what "fairness" <i>is</i> is delicate. There has been some good technical work in this area that I have long admired from afar -- see e.g. the<a href="http://www.fatml.org/"> "FATML" (Fairness and Transparency in Machine Learning) Workshop</a> to get an idea of the range of work being done, and the folks doing it. People like <a href="http://research.microsoft.com/en-us/people/dwork/">Cynthia Dwork</a>, <a href="http://www.moritzhardt.com/">Moritz Hardt</a>, <a href="http://solon.barocas.org/">Solon Barocas</a>, <a href="http://www.cs.utah.edu/~suresh/web/">Suresh Venkatasubramanian</a>, <a href="https://www.haverford.edu/users/sfriedle">Sorelle Friedler</a>, <a href="https://mathbabe.org/">Cathy O'Neil</a>, and others have been doing important work thinking about these problems for quite some time. A particularly nice early paper that I recommend everyone interested in the area read is <a href="http://arxiv.org/abs/1104.3913">Fairness Through Awareness</a>, by Dwork, Hardt, Pitassi, Reingold, and Zemel. It was first posted online in 2011(!), and in retrospect is quite prescient in its discussion of algorithmic fairness.<br /><br />So I'm happy to finally have something interesting to say about the topic! My student <a href="http://www.cis.upenn.edu/~majos">Matthew Joseph</a>, <a href="http://www.cis.upenn.edu/~mkearns/">Michael Kearns</a>, <a href="http://www.cs.cmu.edu/~jamiemmt/">Jamie Morgenstern</a>, and I just posted a new paper online that I'm excited about: <a href="http://arxiv.org/abs/1605.07139">Fairness in Learning: Classic and Contextual Bandits</a>. I'll mostly let the paper speak for itself, but briefly, we write down a simple but (I think) compelling definition of fairness in a stylized general model of sequential decision making called the "contextual bandit setting". To keep a canonical problem in your mind, imagine the following: There are a bunch of different populations (say racial or socioeconomic groups), and you are a loan officer. Every day, an individual from each population applies for a loan. You get to see the loan application for each person (this is the "context"), and have to decide who to give the loan to. When you give out the loan, you observe some reward (e.g. you see if they paid back the loan), but you don't see what reward you -would- have gotten had you given the loan to someone else. Our fairness condition says roughly that an algorithm is "fair" if it never preferentially gives a loan to a less qualified applicant over a more qualified applicant -- where the quality of an applicant in our setting is precisely the probability that they pay back the loan. (It prohibits discriminating against qualified applicants on an individual basis -- even if they happen to come from a population that is less credit-worthy on average, or from a population that the bank doesn't understand as well).<br /><br />It might seem like this definition of fairness is entirely consistent with the profit motivation of a bank -- why would a bank ever want to give a loan to an applicant less likely to pay it back? Indeed, this would be true if the bank had nothing to learn -- i.e. if it already knew the optimal rule mapping loan applications to credit-worthiness. Said another way, <i>implementing</i> the optimal policy is entirely consistent with our fairness definition. Our main conceptual message is that fairness can nevertheless be an obstruction to <i>learning</i> the optimal policy.<br /><br />What our results say is that "fairness" always has a cost in terms of the optimal learning rate achievable by algorithms in this setting. For some kinds of problems, the cost is mild in that the cost of fairness on the learning rate is only polynomial (e.g. when credit-worthiness is determined by a simple linear regression model on the features of a loan application). On the other hand, for other kinds of problems, the cost of fairness on the learning rate is severe, in that it can slow learning by an exponential factor (e.g. when credit-worthiness is determined by an AND of features in the loan application). Put another way, for the problems in which the cost of fairness is severe, if the bank were to use a fast learning algorithm (absent a fairness constraint), the algorithm might be "unfair" for a very long time, even if in the limit, once it learned the truly optimal policy, it would eventually be fair. One friction to fairness is that we don't live in the limit -- we are always in a state of learning.Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com2tag:blogger.com,1999:blog-25562705.post-53675474038193182452015-10-10T13:12:00.000-04:002015-10-10T14:31:35.681-04:00Penn is Hiring in Computer SciencePenn Engineering is embarking on a period of substantial growth, and the computer science department plans to hire lots of people over the next several years. (You can see a draft of the Penn Engineering plan for growth <a href="http://www.seas.upenn.edu/about-seas/pdf/PennEngineering2020_10.5.15.pdf">here</a>. "Data Science and Computation" and Security are both priority areas).<br /><div><br /></div><div>This year, we are planning to hire for multiple positions, both junior and senior, with a focus on (among other things), machine learning. </div><div><br /></div><div>So if you are on the market (or thinking about it), send us your application -- apply here: <a href="https://facultysearches.provost.upenn.edu/postings/663">https://facultysearches.provost.upenn.edu/postings/663 </a></div><div><br /></div><div>(Unless you want to apply for an endowed chair in computer graphics -- then apply here: <a href="https://facultysearches.provost.upenn.edu/postings/664">https://facultysearches.provost.upenn.edu/postings/664</a> )<br /><br /><b>Edit</b>: I forgot to mention! Interest in machine learning is university wide -- both statistics and ESE also plan to hire in machine learning.<br />Here is the link for applying to the statistics position:<a href="https://statistics.wharton.upenn.edu/recruiting/facultypositions/"> https://statistics.wharton.upenn.edu/recruiting/facultypositions/</a><br />And here is the link for ESE: <a href="http://www.ese.upenn.edu/faculty-staff/index.php">http://www.ese.upenn.edu/faculty-staff/index.php</a></div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-76473902829633529402015-06-09T10:43:00.000-04:002015-06-11T07:22:37.797-04:00An action packed Monday at FCRCFCRC begins next week, and due to the wonders of co-location will be action packed. (Monday will have among other things EC workshops, as well as the first full day of STOC talks). I've found myself on the organizing committee of two of the three EC workshops, and Monday is also when our STOC paper is scheduled.<br /><br />So here are three (partially) conflicting events you might be interested in:<br /><br /><a href="http://netecon.eurecom.fr/NetEcon2015/">NetEcon 2015</a>: Highlights include excellent keynote speakers: Rakesh Vohra at 9:00 am, Eva Tardos at 2:00 pm, and R. Srikant at 4:00 pm<br /><br /><a href="https://sites.google.com/site/agtanddatascienceworkshop2015/schedule">The Workshop on Algorithmic Game Theory and Data Science</a>: This workshop is highlighting work in a very exciting area -- the intersection between "data science" and mechanism design -- which is at its very beginning, and I think ripe for lots of important work to be done. Its also attracted a great lineup of speakers (my student <a href="http://www.cis.upenn.edu/~wuzhiwei/">Steven</a> will be giving the talk on <a href="http://arxiv.org/abs/1504.01033">our paper</a>).<br /><br />The <a href="http://acm-stoc.org/stoc2015/program.html">STOC presentation</a> of our paper, <a href="http://arxiv.org/abs/1411.2664">Preserving Statistical Validity in Adaptive Data Analysis</a>: This is at 1:55pm, unfortunately conflicting with NetEcon -- but the attendees of the AGT + Data Science workshop will get a break in order to attend. <a href="http://researcher.watson.ibm.com/researcher/view.php?person=us-vitaly">Vitaly</a> will be giving the talk, which I expect will be very good.<br /><br />If you want to hear a longer (but probably less good) version of the talk, you can<a href="https://tcsplus.wordpress.com/2015/06/03/tcs-talk-wednesday-june-10-aaron-roth-upenn/"> tune in tomorrow</a> at 1pm eastern when I talk about this paper for TCS+<br /><br /><span style="color: red;">EDIT: </span>The video of the talk is <a href="https://www.youtube.com/watch?v=sTKHAuAkuv8">here</a>. It went off with only one technical hitch.<br /><div class="separator" style="clear: both; text-align: center;"><br /><iframe width="320" height="266" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/sTKHAuAkuv8/0.jpg" src="https://www.youtube.com/embed/sTKHAuAkuv8?feature=player_embedded" frameborder="0" allowfullscreen></iframe></div><br />Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-34687729811059474752015-04-16T13:11:00.002-04:002015-04-16T13:11:14.200-04:00Algorithmic Game Theory and Data Science<div style="background: rgb(255, 255, 255); color: #444444; font-family: Arial, Verdana, sans-serif; font-size: 1.8em; margin: 0px; padding-left: 10px; padding-right: 10px;"><span style="color: black; font-size: small;">With FOCS submissions sent off and EC rejections in hand, its time to think about presenting your work at a workshop, and chat with your colleagues doing similar things. </span></div><div style="background: rgb(255, 255, 255); color: #444444; font-family: Arial, Verdana, sans-serif; font-size: 1.8em; margin: 0px; padding-left: 10px; padding-right: 10px;"><span style="color: black; font-size: small;"><br /></span></div><div style="background: rgb(255, 255, 255); color: #444444; font-family: Arial, Verdana, sans-serif; font-size: 1.8em; margin: 0px; padding-left: 10px; padding-right: 10px;"><span style="color: black; font-size: small;">If you are working on something at the intersection of algorithmic game theory and machine learning (this includes e.g. the sample complexity of auction design, or learning from revealed preferences, or learning from censored feedback), then you should consider the "Algorithmic Game Theory and Data Science" workshop that we'll be running during EC 2015. Conveniently, this is at FCRC, so if you were planning on attending EC or STOC (or SIGmetrics, or CCC, or...) you'll already be there in Portland. </span></div><div style="background: rgb(255, 255, 255); color: #444444; font-family: Arial, Verdana, sans-serif; font-size: 1.8em; margin: 0px; padding-left: 10px; padding-right: 10px;"><span style="color: black; font-size: small;">Deadline is in 10 days!</span></div><div style="background: rgb(255, 255, 255); color: #444444; font-family: Arial, Verdana, sans-serif; font-size: 1.8em; margin: 0px; padding-left: 10px; padding-right: 10px;"><span style="color: black; font-size: small;"><br /></span></div><div style="background: rgb(255, 255, 255); margin: 0px; padding-left: 10px; padding-right: 10px;"><span style="font-family: Arial, Verdana, sans-serif;">https://sites.google.com/site/agtanddatascienceworkshop2015/</span></div><div style="background: rgb(255, 255, 255); margin: 0px; padding-left: 10px; padding-right: 10px;"><span style="font-family: Arial, Verdana, sans-serif;"><br /></span></div><div style="background: rgb(255, 255, 255); margin: 0px; padding-left: 10px; padding-right: 10px;"><span style="font-family: Arial, Verdana, sans-serif;">---------------------------</span></div><h3 align="left" id="sites-page-title-header" style="background: rgb(255, 255, 255); color: #444444; font-family: Arial, Verdana, sans-serif; font-size: 1.8em; margin: 0px; padding-left: 10px; padding-right: 10px;" xmlns="http://www.w3.org/1999/xhtml"><span dir="ltr" style="outline: none;" tabindex="-1"><br /></span></h3><h3 align="left" id="sites-page-title-header" style="background: rgb(255, 255, 255); color: #444444; font-family: Arial, Verdana, sans-serif; font-size: 1.8em; margin: 0px; padding-left: 10px; padding-right: 10px;" xmlns="http://www.w3.org/1999/xhtml"><span dir="ltr" id="sites-page-title" style="outline: none;" tabindex="-1">Call for Papers</span></h3><div class="sites-canvas-main" id="sites-canvas-main" style="background-color: white; color: #444444; font-family: Arial, Verdana, sans-serif; font-size: 13.3333330154419px; line-height: 21.3333320617676px; min-height: 150px; overflow: hidden; padding-bottom: 5px; padding-top: 15px;"><div id="sites-canvas-main-content"><table cellspacing="0" class="sites-layout-name-one-column sites-layout-hbox" style="margin: 0px; table-layout: fixed; width: 1547px;" xmlns="http://www.w3.org/1999/xhtml"><tbody><tr><td class="sites-layout-tile sites-tile-name-content-1" style="padding: 10px; vertical-align: top;"><div dir="ltr"><div><span style="font-size: small;">In conjunction with the Sixteenth ACM Conference on Economics and Computation (EC'15), we solicit submissions for the First Workshop on Algorithmic Game Theory and Data Science, to be held on June 15, 2015 in Portland, Oregon, USA.</span></div><div><span style="font-size: small;"><br /></span></div><div><span style="font-size: small;">Computer systems have become the primary mediator of social and economic interactions, enabling transactions at ever-increasing scale. Mechanism design when done on a large scale needs to be a <i>data-driven</i> enterprise. It seeks to optimize some objective with respect to a huge underlying population that the mechanism designer does not have direct access to. Instead, the mechanism designer typically will have access to sampled behavior from that population (e.g. bid histories, or purchase decisions). This means that, on the one hand, mechanism designers will need to bring to bear data-driven methodology from statistical learning theory, econometrics, and revealed preference theory. On the other hand, strategic settings pose new challenges in data science, and approaches for learning and inference need to be adapted to account for strategization. </span></div><div><span style="font-size: small;"><br /></span></div><div><span style="font-size: small;">The goal of this workshop is to frame the agenda for research at the interface of algorithms, game theory, and data science. Papers from a rich set of experimental, empirical, and theoretical perspectives are invited. Topics of interest include but are not limited to:</span></div><div><ul><li style="list-style-position: outside; list-style-type: square;"><span style="background-color: transparent; line-height: 1.6;"><b>Can good mechanisms be learned by observing agent behavior in response to other mechanisms?</b> How hard is it to "learn'' a revenue maximizing auction given a sampled bid history? How hard is it to learn a predictive model of customer purchase decisions, or better yet, a set of prices that will accurately maximize profit under these behavioral decisions? </span></li><li style="list-style-position: outside; list-style-type: square;"><span style="background-color: transparent; line-height: 1.6;"><b>What is the sample complexity of mechanism design?</b> How much data is necessary to enable good mechanism design?</span></li><li style="list-style-position: outside; list-style-type: square;"><span style="font-size: small;"><b>How does mechanism design affect inference? </b> Are outcomes of some mechanisms more informative than those of others from the viewpoint of inference?</span></li><li style="list-style-position: outside; list-style-type: square;"><span style="font-size: small;"><b>How does inference affect mechanism design? </b> If participants know that their data is to be used for inference, how does this knowledge affect their behavior in a mechanism?</span></li><li style="list-style-position: outside; list-style-type: square;"><span style="font-size: small;"><b>Can tools from computer science and game theory be used to contribute rigorous guarantees to interactive data analysis? </b> Strategic interactions between a mechanism and a user base are often interactive (e.g. in the case of an ascending price auction, or repeated interaction with a customer and an online retailer), which is a setting in which traditional methods for preventing data over-fitting are weak.</span></li><li style="list-style-position: outside; list-style-type: square;"><span style="font-size: small;"><b>Is data an economic model?</b> Can data be used to evaluate or replace existing economic models? What is the consequence for game theory and economics for replacing the model with data.</span></li></ul></div><div><span style="font-size: small;"><br /></span></div><div><b><span style="font-size: medium;">Submission Instructions</span></b></div><div><span style="font-size: small;"><br /></span></div><div><span style="background-color: transparent; line-height: 1.6;">Any submission format between abstracts and full papers will be considered. </span><span style="background-color: transparent; line-height: 1.6;">Abstracts may be rejected if we cannot sufficiently evaluate their contribution.</span><span style="background-color: transparent; line-height: 1.6;"> </span><span style="background-color: transparent; line-height: 1.6;">Full papers will be evaluated after page 10 only at the discretion of the committee.</span></div><div><span style="background-color: transparent; font-size: small;">We solicit both new work and work recently published or soon to be published in another venue. For submissions of the latter kind, authors must clearly state the venue of publication. T</span><span style="background-color: transparent; line-height: 1.6;">his workshop will have no published proceedings. Papers appearing in published conference proceedings or journals subsequent to EC 2014 will be considered, though preference may be given to papers that have not yet appeared. Papers that have appeared or are to appear at EC or affiliated workshops will not be considered.</span><br /><span style="background-color: transparent; line-height: 1.6;">Authors are encouraged to provide a link to an online version of the paper (such as on arXiv). If accepted, such papers will be linked via an index to give an informal record of the workshop.</span><br /><span style="font-size: small;"><span style="line-height: 23.2727279663086px;">All submissions should be sent electronically to </span></span><span style="background-color: transparent; line-height: 23.2727279663086px;"><a href="mailto:AGTDataScienceWorkshop15@gmail.com" style="color: #0033cc;">AGTDataScienceWorkshop15@gmail.com</a> on or before April 26th, 2015. </span><span style="font-size: small;">Notification of acceptance will be on May 11, 2015.</span></div><div><div><b><span style="font-size: medium;"><br /></span></b></div><div><b><span style="font-size: medium;">Organizing Committee</span></b></div><div><br /></div><div><a href="http://pages.cs.wisc.edu/~shuchi/" rel="nofollow" style="color: #0033cc;">Shuchi Chawla</a>, U. of Wisconsin </div><div><a href="http://www.fuhuthu.com/" rel="nofollow" style="color: #0033cc;">Hu Fu</a>, Microsoft Research</div><div><a href="http://www.eecs.northwestern.edu/hartline" rel="nofollow" style="color: #0033cc;">Jason Hartline</a>, Northwestern U.</div><div><a href="http://people.virginia.edu/~dn4w/" rel="nofollow" style="color: #0033cc;">Denis Nekipelov</a>, U. of Virginia</div><div><a href="http://www.cis.upenn.edu/~aaroth/" rel="nofollow" style="color: #0033cc;">Aaron Roth</a>, U. of Pennsylvania</div><div><a href="https://labs.ebay.com/people/kane-sweeney/" rel="nofollow" style="color: #0033cc;">Kane Sweeney</a>, eBay and Stubhub</div></div></div></td></tr></tbody></table></div></div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-24653381990881397392015-04-07T08:05:00.003-04:002015-04-07T08:05:59.693-04:00Netecon deadline in two weeksA reminder that the NetEcon workshop deadline is coming up in two weeks. If you plan to be at FCRC (for e.g. STOC, or EC, or Sigmetrics), this will be a great place to present your work and get it seen by both the EC and the SIGmetrics community. There's also a great lineup of invited talks (abstracts here: http://netecon.eurecom.fr/NetEcon2015/keynotes.html ) by R. Srikant, Rakesh Vohra, and Eva Tardos.<br /><br />Here is the call: http://netecon.eurecom.fr/NetEcon2015/index.html<br /><br />The submission deadline is April 22.Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-35562072944143973972015-02-22T21:43:00.004-05:002015-02-22T21:43:33.948-05:00STOC 2015 Call for Workshops and TutorialsSanjeev Khanna and Chandra Chekuri are co-chairing the STOC 2015 workshops and tutorials, and are looking for submissions. The call is below:<br /><br /><h3 style="margin-top: 0px;">Call for STOC 2015 Workshop and Tutorial Proposals</h3><ul><li>Workshop and Tutorial Day: <strong>Sunday, June 14, 2015</strong></li><li>Workshop and Tutorial Co-Chairs: <i>Chandra Chekuri</i> and <i>Sanjeev Khanna</i></li><li>Submission deadline: <strong>March 20, 2015</strong></li><li>Notification: <strong>March 30, 2015</strong></li></ul>On Sunday, June 14, immediately preceding the main conference, STOC 2015 will hold a workshop-and-tutorials day. <strong>We invite groups of interested researchers to submit workshop or tutorial proposals.</strong> The goal of a workshop is to provide an informal forum for researchers to discuss important research questions, directions, and challenges. Connections between theoretical computer science and other areas, topics that are not well represented at STOC, and open problems are encouraged as workshop topics. Organizers are completely free to choose their workshop formats (invited speakers, panel discussions, etc.). The program for June 14th may also involve tutorials, each consisting of 1-2 survey talks on a particular area, and we welcome tutorial proposals as well.<br />STOC does not have funds to pay travel expenses or honoraria to invited workshop and tutorial speakers. Workshop and tutorials attendance will be free, and there is no separate registration for attending them. STOC will support coffee breaks for the workshops/tutorials attendees but no lunch will be provided. Note that STOC registration neither includes FCRC registration for Sunday, June 14 nor covers lunch for Sunday, June 14. Workshop/tutorial attendees who wish to attend another FCRC conference on June 14, would need to register for that conference.<br /><h3>Proposal submission</h3>Workshop and tutorial proposals should be no longer than 2 pages. Please include a list of names and email addresses of the organizers, a description of the topic and the goals of the workshop or tutorial, the proposed workshop format (invited talks, contributed talks, panel, etc.), and proposed or tentatively confirmed speakers if known. Please also indicate the preferred length of time for your workshop or tutorial, along with the minimum acceptable time. We anticipate a 4-5 hour block for each workshop and a 2-4 hour block for each tutorial. Please feel free to contact the Workshop and Tutorial Co-Chairs at the email addresses below if you have questions about workshop or tutorial proposals.<br /><h3>Submission deadline</h3>Proposals should be submitted by <strong>March 20, 2015</strong>, via email to <a href="mailto:chekuri@illinois.edu">chekuri@illinois.edu</a> and <a href="mailto:sanjeev@cis.upenn.edu">sanjeev@cis.upenn.edu</a>. Proposers will be notified by <strong>March 30, 2015</strong>, about whether their proposals have been accepted.<br /><br />http://acm-stoc.org/stoc2015/callforworkshops.htmlAaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-14881256886888339682015-02-13T08:22:00.001-05:002015-02-13T08:22:20.095-05:00Bringing Differential Privacy to the Masses <3This Valentines Day, we'll be bringing differential privacy to the (scientific) masses, with a session at the AAAS annual meeting in San Jose.<br /><br />If you happen to be attending, you should stop by: https://aaas.confex.com/aaas/2015/webprogram/Session9556.htmlAaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-21692497908044422352015-01-28T17:59:00.002-05:002015-01-28T17:59:47.890-05:00NetEcon 2015Patrick <span style="white-space: pre-wrap;">Loiseau, Adam Wierman, and I are co-chairing the 2015 NetEcon workshop, to be held in conjunction with EC and Sigmetrics at this year's FCRC in Portland. You should stop by if you are attending any of the FCRC conferences, (and submit a paper). If you haven't been to a previous iteration, this workshop brings together people interested in game theory from both the networking and theory/AI communities, so is a great place to present work that might be of interest to both communities, or to pick up problems that are interesting from a different community than yours. </span><br /><span style="white-space: pre-wrap;"><br /></span><span style="white-space: pre-wrap;">We've got a great set of invited speakers: R. Srikant, Ricky Vohra, and Eva Tardos. </span><br /><span style="white-space: pre-wrap;"><br /></span><span style="white-space: pre-wrap;">So start thinking about what you want to submit -- you've only got about 3 months. </span><br /><pre style="white-space: pre-wrap; word-wrap: break-word;"><br />*******************************************************************<br />Call For Papers:<br /><br /> NetEcon 2015: The 10th Workshop on the Economics of Networks, <br />Systems and Computation<br /> At FCRC 2015, in conjunction with ACM EC and ACM SIGMETRICS<br /> Monday, June 15, 2015 (Portland, Oregon, USA)<br /><br />http://netecon.eurecom.fr/NetEcon2015/<br /><br /><br />*******************************************************************<br />INVITED SPEAKERS<br /><br /> * *R. Srikant*, University of Illinois at Urbana-Champaign<br /> * *Rakesh V. Vohra*, University of Pennsylvania<br /> * *Eva Tardos*, Cornell University<br /><br /><br />*******************************************************************<br />CALL FOR PAPERS<br /><br />Today's communication networks and networked systems are highly complex <br />and heterogeneous, and are often owned by multiple profit-making <br />entities. For new technologies or infrastructure designs to be adopted, <br />they must not be only based on sound engineering performance <br />considerations but also present the right economic incentives. Recent <br />changes in regulations of the telecommunication industry make such <br />economic considerations even more urgent. For instance, concerns such as <br />network neutrality have a significant impact on the evolution of <br />communication networks.<br /><br />At the same time, communication networks and networked systems support <br />increasing economic activity based on applications and services such as <br />cloud computing, social networks, and peer-to-peer networks. These <br />applications pose new challenges such as the development of good pricing <br />and incentive mechanisms to promote effective system-wide behavior. In <br />relation to these applications, security and privacy also require <br />consideration of economic aspects to be fully understood.<br /><br />The aim of NetEcon is to foster discussions on the application of <br />economic and game-theoretic models and principles to address challenges <br />in the development of networks and network-based applications and <br />services. NetEcon was established in 2006 (succeeding to the P2PECON, <br />IBC and PINS workshops) and merged with the W-PIN workshop in 2013. We <br />invite submission of extended abstracts describing original research on <br />theoretical/methodological contributions or on applications to cases of <br />interest. It is our hope that NetEcon will serve as a feeder workshop, <br />i.e., that expanded, polished versions of extended abstracts will appear <br />later in major conference proceedings and refereed journals of relevant <br />research communities.<br /><br />Topics of interest include (but are not limited to):<br /><br /> * Pricing of resources in communication networks, grids, and cloud <br />computing<br /> * Pricing of information goods and services; copyright issues, <br />effect of network externalities (e.g., in social network)<br /> * Economic issues in universal broadband access; economics of <br />interconnection and peering<br /> * Effects of market structure and regulations (e.g., network <br />neutrality)<br /> * Economics of network security and privacy; valuation of personal data<br /> * Auctions with applications to networks: spectrum auctions, <br />auction-based marketplaces for network and cloud resources<br /> * Incentive mechanisms for networks: peer-to-peer systems, clouds, <br />wireless networks, spam prevention, security<br /> * Methods for engineering incentives and disincentives (e.g., <br />reputation, trust, control, accountability, anonymity)<br /> * Empirical studies of strategic behavior (or the lack thereof) in <br />existing, deployed systems<br /> * Design of incentive-aware network architectures and protocols<br /> * Game-theoretic models and techniques for network economics: large <br />games, learning, mechanism design, interaction of game theory and <br />information theory or queuing theory, information exchange, diffusion, <br />dynamics of cooperation and network formation, trades in social and <br />economic networks<br /> * Algorithmic mechanism design for network systems<br /> * Critiques of existing models and solution concepts, as well as <br />proposals of better models and solution concepts<br /> * Studies of open collaboration, peer production, crowdsourcing, <br />and human computation.<br /><br /><br />*******************************************************************<br />SUBMISSION FORMATTING GUIDELINES AND PROCEEDINGS<br /><br />Submissions must be in the form of extended abstracts of 3-4 pages, <br />including all figures, tables, references, appendices, etc. They must be <br />formatted according to the standard alternate ACM PER double column <br />format using letter paper. You are encouraged to use the ACM <br />sig-alternate-per latex template <br />(http://www.sigmetrics.org/sig-alternate-per.cls).<br /><br />Accepted extended abstracts will be published in a special issue of ACM <br />Performance Evaluation Review (PER) and will be available online through <br />ACM portal digital library. Authors of accepted abstracts grant ACM <br />permission to publish them in print and digital formats.<br /><br />Note that authors retain the copyright of their work published in ACM <br />PER, with freedom to submit it elsewhere. Yet, authors for whom <br />publication of a 3-4 pages extended abstract in the NetEcon 2015 <br />proceedings would preclude later publication of an expanded version in <br />the relevant venue may elect to contribute only a one-page abstract of <br />their submitted extended abstract to the NetEcon 2015 proceedings. Such <br />an abstract should include the URL of a working paper or preprint that <br />contains the main results presented at the NetEcon workshop. Authors <br />will make this decision after receiving a notice of acceptance.<br /><br />If the number of excellent submissions is larger than we have space to <br />allot presentations for, some authors will be offered the opportunity to <br />present their work during a poster session.<br /><br /><br />*******************************************************************<br />COMMITTES<br /><br />PC CHAIRS<br /> Patrick Loiseau (EURECOM, France)<br /> Aaron Roth (UPenn, USA)<br /> Adam Wierman (Caltech, USA)<br /><br />WEBMASTER<br /> Michela Chessa (EURECOM, France)<br /><br />TECHNICAL PROGRAM COMMITTEE<br /> Matthew Andrews (Alcatel-Lucent Bell Labs, USA)<br /> Itai Ashlagi (MIT, USA)<br /> Moshe Babaioff (Microsoft Research, Israel)<br /> Tamer BaÅŸar (University of Illinois, Urbana-Champaign, USA)<br /> Bobby Bhattarcharjee (University of Maryland, USA)<br /> Rainer BÃ¶hme (WWU MÃ¼nster, Germany)<br /> Kostas Bimpikis (Stanford University, USA)<br /> Eilyan Bitar (Cornell University, USA)<br /> Augustin Chaintreau (Columbia University, USA)<br /> Michela Chessa (EURECOM, France)<br /> kc claffy (CAIDA / UC San Diego, USA)<br /> Costas Courcoubetis (SUTD, Singapore and AUEB, Greece)<br /> Amogh Dhamdhere (CAIDA / UC San Diego, USA)<br /> Constantine Dovrolis (GeorgiaTech, USA)<br /> Rachid Elazouzi (University of Avignon, France)<br /> Sergey Gorinsky (Institute IMDEA Networks, Spain)<br /> Jens Grossklags (The Pennsylvania State University, USA)<br /> Roch Guerin (Washington University in St. Louis, USA)<br /> Nidhi Hegde (Alcatel-Lucent Bell Labs, France)<br /> Ekram Hossain (University of Manitoba, Canada)<br /> Stratis Ioannidis (Yahoo! labs, USA)<br /> Krisnamurthy Iyer (Cornell University, USA)<br /> Rahul Jain (USC, USA)<br /> Ian Kash (Microsoft Research, UK)<br /> David Kempe (USC, USA)<br /> Peter Key (Microsoft Research, UK)<br /> Nikolaos Laoutaris (Telefonica Research, Spain)<br /> Dave Levin (University of Maryland, USA)<br /> Patrick Loiseau (EURECOM, France) -- co-chair<br /> Brendan Lucier (Microsoft Research, USA)<br /> John C. S. Lui (The Chinese University of Hong Kong, Hong Kong)<br /> Patrick MaillÃ© (Institut Mines-Telecom / Telecom Bretagne, France)<br /> Jason Marden (University of Colorado, Boulder, USA)<br /> Ravi Mazumdar (University of Waterloo, Canada)<br /> Jeonghoon Mo (Yonsei University, South Korea)<br /> John Musacchio (UC Santa Cruz, USA)<br /> Andrew Odlyzko (University of Minnesota, Minneapolis, USA)<br /> Aaron Roth (UPenn, USA) -- co-chair<br /> Galina Schwartz (UC Berkeley, USA)<br /> Paul G. Spirakis (University of Liverpool, UK and CTI, Greece)<br /> NicolÃ¡s Stier Moses (Facebook Data Science, USA)<br /> Vijay Subramanian (University of Michigan, Ann Arbor, USA)<br /> John N. Tsitsiklis (MIT, USA)<br /> Bruno Tuffin (Inria, France)<br /> Adrian Vetta (McGill University, Canada)<br /> Steven Weber (Drexel University, USA)<br /> Adam Wierman (Caltech, USA) -- co-chair<br /><br /><br />*******************************************************************<br />IMPORTANT DATES<br /><br /> * Wednesday April 22, 2015, 11:59pm PST: Submission deadline (firm)<br /> * Wednesday May 13, 2015: Notification to authors<br /> * Monday June 8, 2015: Final version for the workshop's website due<br /> * Monday June 15, 2015: Workshop in Portland<br /> * Monday July 13, 2015: Final version for the ACM PER proceedings due<br /><br /><br />*******************************************************************<br />ADDITIONAL INFORMATION<br /><br />For more information, please contact the organizers or visit the <br />workshop website: http://netecon.eurecom.fr/NetEcon2015/.<br /></pre><div><br /></div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0tag:blogger.com,1999:blog-25562705.post-52409578513460549832014-11-25T13:49:00.000-05:002014-11-25T13:49:17.732-05:00Differential Privacy Workshop in LondonThere will be a differential privacy workshop in London in April, accepting submissions soon. If you have something you are working on, consider submitting here. Some highlights:<br /><br />-- Although the workshop will not have proceedings (so you can as usual submit a talk and still submit it to a conference of your choosing), exceptional submissions will be invited to a special issue of the Journal of Privacy and Confidentiality.<br /><br />-- The PC is pretty inter-disciplinary. This is certainly not just a Theory-A workshop. Work on privacy in all areas is on topic.<br /><br />-- You get to hear Jon Ullman give a (presumably excellent) talk. <br style="background-color: white;" /><br style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;" /><br /><pre style="white-space: pre-wrap; word-wrap: break-word;">CALL FOR PAPERS<br />TPDP 2015<br />First workshop on the Theory and Practice of Differential Privacy<br />18th April 2015, London, UK<br />Affiliated to ETAPS<br />http://tpdp.computing.dundee.ac.uk<br /><br />Differential privacy is a promising approach to the privacy-preserving<br />release of data: it offers a strong guaranteed bound on the increase<br />in harm that a user incurs as a result of participating in a<br />differentially private data analysis.<br /><br />Researchers in differential privacy come from several area of computer<br />science as algorithms, programming languages, security, databases,<br />machine learning, as well as from several areas of statistics and data<br />analysis. The workshop is intended to be an occasion for researchers<br />from these different research areas to discuss the recent developments<br />in the theory and practice of differential privacy.<br /><br />**Submissions**<br /><br />The overall goal of TPDP is to stimulate the discussion on the<br />relevance of differentially private data analyses in practice. For<br />this reason, we seek contributions from different research areas of<br />computer science and statistics.<br /><br />Authors are invited to submit a short abstract (4-5 pages maximum) of<br />their work by January 23, 2015. Abstracts must be written in English<br />and be submitted as a single PDF file at the EasyChair page for TPDP:<br />https://easychair.org/conferences/?conf=3Dtpdp2015<br /><br />Submissions will be judged on originality, relevance, interest and<br />clarity. Submission should describe novel works or works that have<br />already appeared elsewhere but that can stimulate the discussion<br />between the different communities. Accepted abstracts will<br />be presented at the workshop.<br /><br />The workshop will not have formal proceedings, but we plan to have a<br />special issue of the Journal of Privacy and Confidentiality devoted to<br />TPDP. Authors presenting valuable contributions at the workshop will<br />be invited to submit a journal version of their work right after the<br />workshop.<br /><br /><br />**Important Dates**<br /><br />-January 23, 2015 - Abstract Submission<br />-February 10, 2015 - Notification<br />-February 14, 2015 - Deadline early registration ETAPS<br />-April 18, 2015 - Workshop<br /><br />-May 15, 2015 Deadline for journal special issue<br /><br /><br />**Topics**<br /><br />Specific topics of interest for the workshop include (but are not limited t=<br />o):<br />theory of differential privacy,<br />verification techniques for differential privacy,<br />programming languages for differential privacy,<br />models for differential privacy,<br />trade-offs between privacy protection and analytic utility,<br />differential privacy and surveys,<br />relaxations of the differential privacy definition,<br />differential privacy vs other privacy notions and methods,<br />differential privacy and accuracy,<br />practical differential privacy,<br />implementations for differential privacy,<br />differential privacy and security,<br />applications of differential privacy.<br /><br /><br />**Invited Speakers**<br /><br />Jonathan Ullman - Simons Fellow at Columbia University,<br /><br />Another invited speaker joint with HotSpot'15 to be confirmed.<br /><br /><br />**Program Committee**<br /><br />Gilles Barthe - IMDEA Software<br />Konstantinos Chatzikokolakis - CNRS and LIX, Ecole Polytechnique<br />Kamalika Chaudhuri - UC San Diego<br />Graham Cormode - University of Warwick<br />George Danezis - University College London<br />Marco Gaboardi - University of Dundee<br />Matteo Maffei - CISPA, Saarland University<br />Catuscia Palamidessi - INRIA and LIX, Ecole Polytechnique<br />Benjamin C. Pierce - University of Pennsylvania<br />Aaron Roth - University of Pennsylvania<br />David Sands - Chalmers University of Technology<br />Chris Skinner - London School of Economics<br />Adam Smith - Pennsylvania State University<br />Carmela Troncoso - Gradiant<br />Salil Vadhan - Harvard University<br /></pre><div><br /></div>Aaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.com0