Yishay Mansour
Tel Aviv University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yishay Mansour.
international joint conference on artificial intelligence | 1999
Michael J. Kearns; Yishay Mansour; Andrew Y. Ng
A critical issue for the application of Markov decision processes (MDPs) to realistic problems is how the complexity of planning scales with the size of the MDP. In stochastic environments with very large or infinite state spaces, traditional planning and reinforcement learning algorithms may be inapplicable, since their running time typically grows linearly with the state space size in the worst case. In this paper we present a new algorithm that, given only a generative model (a natural and common type of simulator) for an arbitrary MDP, performs on-line, near-optimal planning with a per-state running time that has no dependence on the number of states. The running time is exponential in the horizon time (which depends only on the discount factor γ and the desired degree of approximation to the optimal policy). Our algorithm thus provides a different complexity trade-off than classical algorithms such as value iteration—rather than scaling linearly in both horizon time and state space size, our running time trades an exponential dependence on the former in exchange for no dependence on the latter.Our algorithm is based on the idea of sparse sampling. We prove that a randomly sampled look-ahead tree that covers only a vanishing fraction of the full look-ahead tree nevertheless suffices to compute near-optimal actions from any state of an MDP. Practical implementations of the algorithm are discussed, and we draw ties to our related recent results on finding a near-best strategy from a given class of strategies in very large partially observable MDPs (Kearns, Mansour, & Ng. Neural information processing systems 13, to appear).
international cryptology conference | 1994
Don Coppersmith; Hugo Krawczyk; Yishay Mansour
We present a new construction of a pseudorandom generator based on a simple combination of two LFSRs. The construction has attractive properties as simplicity (conceptual and implementation-wise), scalability (hardware and security), proven minimal security conditions (exponential period, exponential linear complexity, good statistical properties), and resistance to known attacks. The construction is suitable for practical implementation of efficient stream cipher cryptosystems.
SIAM Journal on Computing | 1998
Eyal Kushilevitz; Yishay Mansour
We show that for any randomized broadcast protocol for radio networks, there exists a network in which the expected time to broadcast a message is
symposium on the theory of computing | 1994
Michael J. Kearns; Yishay Mansour; Dana Ron; Ronitt Rubinfeld; Robert E. Schapire; Linda Sellie
\Omega(D\log (N/D))
symposium on the theory of computing | 1994
Avrim Blum; Merrick L. Furst; Jeffrey C. Jackson; Michael J. Kearns; Yishay Mansour; Steven Rudich
, where D is the diameter of the network and N is the number of nodes. This implies a tight lower bound of
Journal of Cryptology | 1997
Shimon Even; Yishay Mansour
\Omega(D\log N)
european conference on computational learning theory | 2004
Eyal Even-Dar; Yishay Mansour
for any
conference on learning theory | 1995
Michael J. Kearns; Yishay Mansour; Andrew Y. Ng; Dana Ron
D \le N^{1-\varepsilon}
conference on learning theory | 2007
Avrim Blum; Yishay Mansour
, where
symposium on discrete algorithms | 2006
Susanne Albers; Stefan Eilts; Eyal Even-Dar; Yishay Mansour; Liam Roditty
\varepsilon > 0