MHB Master algorithm design and upper bound proof

AI Thread Summary
The discussion revolves around a user seeking help with a past exam question related to online learning. The user has made some initial progress by establishing a loss function for a binary classification scenario, represented as Loss(S) = ∑|yt - ŷt|. However, they express uncertainty about how to advance from this point. Other participants emphasize the importance of sharing progress to facilitate better assistance, encouraging the user to provide more details about their thought process or any attempts made to solve the problem. This collaborative approach aims to enhance the effectiveness of the help provided.
akerman
Messages
26
Reaction score
0
Hello,

I am currently preparing myself for exams and I have a past exam question which I can't solve. This question concerns online learning and the following picture illustrates it: View attachment 5486
Is anyone able to help me out and propose a solution to this question?
 

Attachments

  • question.JPG
    question.JPG
    99.2 KB · Views: 95
Technology news on Phys.org
Hello, akerman! :D

We ask that our users show their progress (work thus far or thoughts on how to begin) when posting questions. This way our helpers can see where you are stuck or may be going astray and will be able to post the best help possible without potentially making a suggestion which you have already tried, which would waste your time and that of the helper.

Can you post what you have done so far?
 
All I have right now is the initial setting where we do not have k classes but we just use {0,1}. For this setting I have that the mistakes or loss for S (online sequence of data) is:
$Loss(S) = \sum_{t=1}^{m} |y_{t} - \hat{y_{t}} |$

From there I don't know how to progress or solve this question...
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
Back
Top