Learning to (Learn at Test Time)
Authors:
Yu Sun,
Xinhao Li,
Karan Dalal,
Chloe Hsu,
Sanmi Koyejo,
Carlos Guestrin,
Xiaolong Wang,
Tatsunori Hashimoto,
Xinlei Chen
Abstract:
We reformulate the problem of supervised learning as learning to learn with two nested loops (i.e. learning problems). The inner loop learns on each individual instance with self-supervision before final prediction. The outer loop learns the self-supervised task used by the inner loop, such that its final prediction improves. Our inner loop turns out to be equivalent to linear attention when the i…
▽ More
We reformulate the problem of supervised learning as learning to learn with two nested loops (i.e. learning problems). The inner loop learns on each individual instance with self-supervision before final prediction. The outer loop learns the self-supervised task used by the inner loop, such that its final prediction improves. Our inner loop turns out to be equivalent to linear attention when the inner-loop learner is only a linear model, and to self-attention when it is a kernel estimator. For practical comparison with linear or self-attention layers, we replace each of them in a transformer with an inner loop, so our outer loop is equivalent to training the architecture. When each inner-loop learner is a neural network, our approach vastly outperforms transformers with linear attention on ImageNet from 224 x 224 raw pixels in both accuracy and FLOPs, while (regular) transformers cannot run.
△ Less
Submitted 7 January, 2024; v1 submitted 20 October, 2023;
originally announced October 2023.
Two-way Linear Probing Revisited
Authors:
Ketan Dalal,
Luc Devroye,
Ebrahim Malalla
Abstract:
We introduce linear probing hashing schemes that construct a hash table of size $n$, with constant load factor $α$, on which the worst-case unsuccessful search time is asymptotically almost surely $O(\log \log n)$. The schemes employ two linear probe sequences to find empty cells for the keys. Matching lower bounds on the maximum cluster size produced by any algorithm that uses two linear probe se…
▽ More
We introduce linear probing hashing schemes that construct a hash table of size $n$, with constant load factor $α$, on which the worst-case unsuccessful search time is asymptotically almost surely $O(\log \log n)$. The schemes employ two linear probe sequences to find empty cells for the keys. Matching lower bounds on the maximum cluster size produced by any algorithm that uses two linear probe sequences are obtained as well.
△ Less
Submitted 18 September, 2023; v1 submitted 11 September, 2023;
originally announced September 2023.