nips nips2009 nips2009-113 knowledge-graph by maker-knowledge-mining
Source: pdf
Author: Guy Shani, Christopher Meek
Abstract: An automated recovery system is a key component in a large data center. Such a system typically employs a hand-made controller created by an expert. While such controllers capture many important aspects of the recovery process, they are often not systematically optimized to reduce costs such as server downtime. In this paper we describe a passive policy learning approach for improving existing recovery policies without exploration. We explain how to use data gathered from the interactions of the hand-made controller with the system, to create an improved controller. We suggest learning an indefinite horizon Partially Observable Markov Decision Process, a model for decision making under uncertainty, and solve it using a point-based algorithm. We describe the complete process, starting with data gathering, model learning, model checking procedures, and computing a policy. 1
Reference: text
sentIndex sentText sentNum sentScore
1 While such controllers capture many important aspects of the recovery process, they are often not systematically optimized to reduce costs such as server downtime. [sent-6, score-0.293]
2 In this paper we describe a passive policy learning approach for improving existing recovery policies without exploration. [sent-7, score-0.854]
3 In such large systems it is prohibitively costly to have a technician decide on a repair action for each observed problem. [sent-14, score-0.677]
4 Therefore, these systems often use some automatic repair policy or controller to choose appropriate repair actions. [sent-15, score-1.53]
5 These repair policies typically receive failure messages from the system. [sent-16, score-0.75]
6 The repair policy receives notifications and decides which actions can fix the observed problems. [sent-19, score-1.08]
7 Given the POMDP parameters, we can compute a policy that optimizes repair costs, but learning the POMDP parameters may be difficult. [sent-24, score-0.907]
8 Typically, the controller will not be designed to perform exploration, and we cannot expect such logs to contain sufficient data to train standard RL techniques. [sent-31, score-0.288]
9 In this paper we introduce a passive policy learning approach, that uses only available information without exploration, to improve an existing repair policy. [sent-32, score-1.011]
10 We suggest a model-checking phase, providing supporting evidence for the quality of the learned model, which may be crucial to help the system administrators decide whether the learned model is appropriate. [sent-34, score-0.323]
11 We proceed to compute a policy for our learned model, that can then be used in the data center instead of the original hand-made controller. [sent-35, score-0.562]
12 We experiment with a synthetic, yet realistic, simulation of machine failures, showing how the policy of the learned POMDP performs close to optimal, and outperforms a set of simpler techniques that learn a policy directly in history space. [sent-36, score-1.104]
13 Many other real world applications, such as assembly lines, medical diagnosis systems, and failure detection and recovery systems, are also controlled by hand-made controllers. [sent-38, score-0.304]
14 Key aspects of the problem include the nature of repair actions and costs, machine failure, failure detection, and control policies. [sent-41, score-0.681]
15 Key aspects of repair actions include: (1) actions may succeed or fail stochastically. [sent-42, score-0.766]
16 We label actions using increasing levels, where problems fixed by an action at level i, are also fixed by any action of level j > i. [sent-44, score-0.458]
17 (3) Action costs are typically escalating, where lower level actions that fix minor problems are relatively cheap, while higher level actions are more expensive. [sent-46, score-0.397]
18 In view of the escalating nature of actions and costs, a natural choice for a policy is an escalation policy. [sent-54, score-0.875]
19 Such policies choose a starting level based on the first observation, and execute an action at that level. [sent-55, score-0.415]
20 In many cases, due to the non-deterministic success of repair actions, each action is tried several times. [sent-56, score-0.615]
21 After the controller decides that the action at the current level cannot fix the problem, the controller escalates to the next action level. [sent-57, score-0.68]
22 For example, the number of retries of an action before an escalation occurs, and the entry level given an observation. [sent-59, score-0.4]
23 System administrators typically collect logs of the hand-made controller execution, for maintenance purposes. [sent-61, score-0.328]
24 We would like to use this knowledge to construct an improved policy that will perform better than the original policy. [sent-63, score-0.467]
25 Formally, we assume that we receive as input a log L of repair sessions. [sent-64, score-0.462]
26 Each repair session is a sequence l = o0 , a1 , o1 , . [sent-65, score-0.507]
27 , onl , starting with an error notification, followed by a set of repair actions and observations until the problem is fixed. [sent-68, score-0.673]
28 In a POMDP the true state is not directly observable and we thus maintain a belief state b ∈ B — a probability distribution over states, where b(s) is the probability that the system is at state s. [sent-93, score-0.315]
29 We assume that every repair session starts with an error observation, typically provided by one of the watchdogs. [sent-94, score-0.545]
30 It is convenient to define a policy for a POMDP as a mapping from belief states to actions π : B → A. [sent-98, score-0.682]
31 Our goal is to find an optimal policy that brings the machine to the healthy state with the minimal cost. [sent-99, score-0.572]
32 One method for computing a policy is through a value function, V , assigning a value to each belief state b. [sent-100, score-0.541]
33 By associating an action a(α) which each vector, a policy π : B → A can be defined through π(b) = a(αb ). [sent-108, score-0.598]
34 In this framework the POMDP has a single special action aT , available in any state, that terminates the repair session. [sent-114, score-0.615]
35 3 3 Learning Policies from System Logs In this section we propose two alternatives for computing a recovery policy given the logs. [sent-119, score-0.553]
36 We begin with a simple, model-free, history-based policy computation. [sent-120, score-0.445]
37 1 Model-Free Learning of Q-values The optimal policy for a POMDP can be expressed as a mapping from action-observation histories to actions. [sent-123, score-0.518]
38 Histories are directly observable, allowing us to use the standard Q function terminology, where Q(h, a) is the expected cost of executing action a with history h and continuing the session until it terminates. [sent-124, score-0.529]
39 The Q function is hence the average cost until repair of executing the action a in history h, under the policy that generated L. [sent-129, score-1.344]
40 An approach that generalizes better is to use a finite history window of size k, discarding all the observations and action occurring more than k steps ago. [sent-132, score-0.322]
41 In practice, the only parameters that are known are the set of possible repair actions and the set of possible observations, but even the number of possible errors is not initially known, let alone the probability of repair or observation. [sent-136, score-1.113]
42 Given the log of repair sessions, we can use a learning algorithm to learn the parameters of the POMDP. [sent-137, score-0.462]
43 Such evidence can be helpful for the system administrators in order to make a decision whether to replace the existing policy with a new policy. [sent-148, score-0.611]
44 Using an imperfect learner such as Baum-Welch does not guarantee that the resulting model indeed maximizes the likelihood of the observations given the policy, even for the same policy that was used to generate the training data. [sent-149, score-0.549]
45 We say that two POMDPs M1 =< S1 , A, tr1 , C1 , Ω, O1 > and M2 =< S2 , A, tr2 , C2 , Ω, O2 > are indistinguishable if for each policy π : H → A, E[ t Ct |M1 , π] = E[ t Ct |M2 , π]. [sent-158, score-0.47]
46 That is, the models are indistinguishable if any policy has the same expected accumulated cost when executed in both models. [sent-159, score-0.595]
47 Many policies cannot be evaluated on the real system because we cannot tolerate damaging policies. [sent-160, score-0.312]
48 We hence focus the model checking phase on comparing the expected cost of the hand-made policy predicted be the learned model to the true expected cost on the real system. [sent-162, score-0.989]
49 To estimate the expected cost in the real system, we use the average cost of the sessions in the logs. [sent-163, score-0.29]
50 To estimate the expected cost of the policy on the learned POMDP we execute a set of trials, each simulating a repair session, using the learned parameters of the POMDP to govern the trial advancement (observation emissions given the history and action). [sent-164, score-1.434]
51 For example, if the predicted cost of the policy over the learned POMDP is more than 20% away from the true expected cost, we may deduce that the learned mode does not properly capture the system dynamics. [sent-166, score-0.828]
52 While checking the models under a single policy cannot ensure that the models are identical, it can detect whether the model is defective. [sent-167, score-0.549]
53 If the learned model produces a substantially different expectation over the cost of a policy than the real system, we know that the model is corrupted prior to executing its optimal policy on the real system. [sent-168, score-1.294]
54 After ensuring that the original policy performs similarity on the real system and on the learned model, we can also evaluate the performance of the computed policy on the learned model. [sent-169, score-1.217]
55 Thus, we can compare the quality of the new policy to the existing one, helping us to understand the potential cost reduction of the new policy. [sent-170, score-0.55]
56 In the simulator we assume that a machine can be in one of n error states, or in healthy state, we also assume n possible repair actions, and m possible observations. [sent-173, score-0.696]
57 We assume that each action was designed to fix a single error state, and set the number of errors to be the number of repair actions. [sent-174, score-0.69]
58 3 · j−i if j ≥ i and 0 otherwise, simulating the escalation power j of repair actions. [sent-177, score-0.706]
59 We set C(s, ai ) = 4i and C(sH , aT ) = 0, simulating the exponential growth of costs in the real AutoPilot system [6], and the zero downtime caused by terminating the session in the healthy state. [sent-178, score-0.409]
60 We execute a hand-made escalation policy with 3 retries (see Section 2) over the simulator and gather a log of repair sequences. [sent-180, score-1.327]
61 Each repair sequence begins with selecting an error uniformly, and executing the policy until the error is fixed. [sent-181, score-1.07]
62 Then, we use the logs in order to learn a Q function 5 Table 1: Average cost of recovery policies in simulation, with increasing model size. [sent-182, score-0.535]
63 Results are averaged over 10 executions, and the worst standard error across all recovery policies is reported in the last column. [sent-183, score-0.343]
64 For the POMDP model, we initialize the number of states to the number of repair actions, initialize transition uniformly, and observation randomly, and execute the Baum-Welch algorithm. [sent-208, score-0.587]
65 For policies, we use πE for the escalation policy, πM for the policy computed by Perseus on the learned model, and πM ∗ for the Perseus policy over the ‘perfect learner’ model. [sent-212, score-1.201]
66 For the history-based Q functions, we use Q to denote the function computed for the complete history, and Qi denotes a policy over history suffixes of length i. [sent-213, score-0.564]
67 A column header π, S denotes the estimated cost of executing π on the simulator, and π, M denotes the estimated cost of executing π on the model M . [sent-214, score-0.355]
68 1 Results We begin with showing the improvement of the policy of the learned models over the original escalation policies. [sent-217, score-0.778]
69 As Table 1 demonstrates, learning a POMDP model and computing its policy always result in a substantial reduction in costs. [sent-218, score-0.47]
70 In the smaller domains Q learning, especially with a history window of 3 (Q3 ) does fairly well, but in the larger domains all history-based policies do not perform well. [sent-223, score-0.345]
71 As we explained above, a model checking phase, comparing the expected cost of a policy on both the real system and the learned model, can provide evidence as to the validity of the learned model. [sent-225, score-0.979]
72 Indeed, as we see in Table 2, the learned models predict an expected cost that is within 3% of the real expected cost. [sent-226, score-0.314]
73 To further validate our learned models, we also compare the expected cost of the policies computed from the models (M and M ∗ ) over the model and the simulator. [sent-227, score-0.442]
74 As expected, the M ∗ predicted costs are within measurement error of the true costs of the policy on the real system. [sent-229, score-0.716]
75 When we use fewer observations, the quality of the learned model is reduced (further from M ∗ ), but the policy that is learned still significantly outperforms the original escalation policy. [sent-233, score-0.898]
76 It is important to note that the hand-made escalation policy that we use is very natural for domains with actions that have escalating costs and effects. [sent-234, score-0.968]
77 Also, the number of actions and errors that we use is similar to these used by current controllers of repair services [6]. [sent-235, score-0.743]
78 As such, the improvements 6 Table 2: Comparing expected cost of policies on the learned model and the simulator for model checking. [sent-236, score-0.575]
79 Results are averaged over 10 executions, and the worst standard error across all recovery policies is reported in the last column. [sent-237, score-0.343]
80 Problem parameters |E| |O| |L| 2 2 10000 4 2 10000 4 4 10000 8 4 50000 8 8 50000 Escalation policy π E , M ∗ πE , M πE , S 21. [sent-238, score-0.445]
81 5 < 250 < 275 that we achieve over this hand-made policy hint that similar gains can be made over the real system. [sent-261, score-0.492]
82 As the input policy does not explore, the set of resulting histories does not provide enough coverage of the history space. [sent-266, score-0.658]
83 For example, if the current repair policy only escalates, the history-based approach will never observe a higher level action followed by a low level action, and cannot evaluate its expected cost. [sent-267, score-1.107]
84 Indeed, the finite history window methods (except for the reactive policy) improve upon the original escalation policy in some cases. [sent-270, score-0.877]
85 It is therefore safe to assume that action a will not fix error e if we never observed a to fix e in the logs, except for the terminating action aT . [sent-282, score-0.384]
86 [8] suggests the CSFR model which is similar to our POMDP formalization, except for a deterministic observation function, the escalation of actions, and the terminating action. [sent-290, score-0.313]
87 Also, as we argue above, in our case a Q function produces substantially inferior policies because of its lack of generalization power in partially observable domains. [sent-296, score-0.299]
88 They then suggest a one step lookahead repair strategy, and a multi-step lookahead, that uses a value function over a belief space similar to the Littman et al. [sent-304, score-0.546]
89 Bayer-Zubek and Dietterich [16] use a set of examples, similar to our logs, to learn a policy for disease diagnosis. [sent-306, score-0.445]
90 6 Conclusion We have presented an approach to improving imperfect repair policies through learning a POMDP model of the problem. [sent-310, score-0.72]
91 Our method takes as input a log of interaction of the existing controller with the system, learns a POMDP model, and computes a policy for the POMDP that can be used in the the real system. [sent-311, score-0.68]
92 The advantage of our method is that it does not require the existing controller to actively explore the effects of actions in all conditions, which may result in unacceptable costs in the real system. [sent-312, score-0.48]
93 We experiment with a synthetic, yet realistic, example of a hand-made escalation policy, where actions are ordered by increasing cost, and any action is repeated a number of times. [sent-314, score-0.521]
94 We show how the policy of the learned model significantly improves the original escalation policy. [sent-315, score-0.803]
95 In the future we intend to use the improved policies to manage repairs in a real data center within the AutoPilot system [6]. [sent-316, score-0.312]
96 There are a number of interesting theoretical questions about our passive policy learning method and about passive policy learning in general. [sent-320, score-1.044]
97 First, for what families of initial policies and system dynamics would a passive policy learning method be expected to yields an improvement in expected costs. [sent-321, score-0.881]
98 Second, what families of initial policies and systems dynamics would a passive policy learning method be expected to yield the optimal policy. [sent-322, score-0.766]
99 Third, how would one characterize when iteratively applying a passive policy learning method would yield expected improvements in expected costs. [sent-323, score-0.616]
100 Finally, while this paper focuses on the important failure recovery problem, our methods may be applicable to a wide range of similar systems, such as assembly line management, and medical diagnosis systems, that currently employ hand-made imperfect controllers. [sent-324, score-0.293]
wordName wordTfidf (topN-words)
[('repair', 0.462), ('policy', 0.445), ('pomdp', 0.383), ('escalation', 0.216), ('policies', 0.197), ('controller', 0.161), ('action', 0.153), ('actions', 0.152), ('logs', 0.127), ('history', 0.119), ('recovery', 0.108), ('simulator', 0.108), ('learned', 0.095), ('costs', 0.093), ('healthy', 0.088), ('executing', 0.087), ('perseus', 0.081), ('checking', 0.079), ('cost', 0.078), ('noti', 0.077), ('passive', 0.077), ('histories', 0.073), ('observable', 0.073), ('system', 0.068), ('failure', 0.067), ('execute', 0.065), ('escalating', 0.062), ('technician', 0.062), ('inde', 0.058), ('belief', 0.057), ('failures', 0.05), ('joshi', 0.049), ('expected', 0.047), ('real', 0.047), ('controllers', 0.046), ('services', 0.046), ('autopilot', 0.046), ('reactive', 0.046), ('rebooting', 0.046), ('watchdogs', 0.046), ('session', 0.045), ('littman', 0.045), ('computers', 0.044), ('pomdps', 0.042), ('administrators', 0.04), ('terminating', 0.04), ('sessions', 0.04), ('state', 0.039), ('error', 0.038), ('errors', 0.037), ('sh', 0.036), ('imperfect', 0.036), ('exploration', 0.035), ('heckerman', 0.033), ('observation', 0.032), ('diagnosis', 0.031), ('escalates', 0.031), ('farms', 0.031), ('retries', 0.031), ('shani', 0.031), ('troubleshooting', 0.031), ('watchdog', 0.031), ('decision', 0.031), ('window', 0.029), ('ei', 0.029), ('partially', 0.029), ('states', 0.028), ('simulating', 0.028), ('reinforcement', 0.027), ('hardware', 0.027), ('horizon', 0.027), ('repairing', 0.027), ('lookahead', 0.027), ('assembly', 0.027), ('fault', 0.027), ('guy', 0.027), ('meek', 0.027), ('existing', 0.027), ('pr', 0.027), ('service', 0.026), ('model', 0.025), ('aliasing', 0.025), ('indistinguishable', 0.025), ('isard', 0.025), ('messages', 0.024), ('optimized', 0.024), ('medical', 0.024), ('aj', 0.023), ('rl', 0.023), ('executions', 0.023), ('pineau', 0.023), ('phase', 0.023), ('original', 0.022), ('server', 0.022), ('learner', 0.022), ('markov', 0.022), ('observations', 0.021), ('coverage', 0.021), ('decides', 0.021), ('create', 0.021)]
simIndex simValue paperId paperTitle
same-paper 1 1.0000001 113 nips-2009-Improving Existing Fault Recovery Policies
Author: Guy Shani, Christopher Meek
Abstract: An automated recovery system is a key component in a large data center. Such a system typically employs a hand-made controller created by an expert. While such controllers capture many important aspects of the recovery process, they are often not systematically optimized to reduce costs such as server downtime. In this paper we describe a passive policy learning approach for improving existing recovery policies without exploration. We explain how to use data gathered from the interactions of the hand-made controller with the system, to create an improved controller. We suggest learning an indefinite horizon Partially Observable Markov Decision Process, a model for decision making under uncertainty, and solve it using a point-based algorithm. We describe the complete process, starting with data gathering, model learning, model checking procedures, and computing a policy. 1
2 0.24812877 242 nips-2009-The Infinite Partially Observable Markov Decision Process
Author: Finale Doshi-velez
Abstract: The Partially Observable Markov Decision Process (POMDP) framework has proven useful in planning domains where agents must balance actions that provide knowledge and actions that provide reward. Unfortunately, most POMDPs are complex structures with a large number of parameters. In many real-world problems, both the structure and the parameters are difficult to specify from domain knowledge alone. Recent work in Bayesian reinforcement learning has made headway in learning POMDP models; however, this work has largely focused on learning the parameters of the POMDP model. We define an infinite POMDP (iPOMDP) model that does not require knowledge of the size of the state space; instead, it assumes that the number of visited states will grow as the agent explores its world and only models visited states explicitly. We demonstrate the iPOMDP on several standard problems. 1
3 0.22287776 145 nips-2009-Manifold Embeddings for Model-Based Reinforcement Learning under Partial Observability
Author: Keith Bush, Joelle Pineau
Abstract: Interesting real-world datasets often exhibit nonlinear, noisy, continuous-valued states that are unexplorable, are poorly described by first principles, and are only partially observable. If partial observability can be overcome, these constraints suggest the use of model-based reinforcement learning. We experiment with manifold embeddings to reconstruct the observable state-space in the context of offline, model-based reinforcement learning. We demonstrate that the embedding of a system can change as a result of learning, and we argue that the best performing embeddings well-represent the dynamics of both the uncontrolled and adaptively controlled system. We apply this approach to learn a neurostimulation policy that suppresses epileptic seizures on animal brain slices. 1
4 0.17750449 250 nips-2009-Training Factor Graphs with Reinforcement Learning for Efficient MAP Inference
Author: Khashayar Rohanimanesh, Sameer Singh, Andrew McCallum, Michael J. Black
Abstract: Large, relational factor graphs with structure defined by first-order logic or other languages give rise to notoriously difficult inference problems. Because unrolling the structure necessary to represent distributions over all hypotheses has exponential blow-up, solutions are often derived from MCMC. However, because of limitations in the design and parameterization of the jump function, these samplingbased methods suffer from local minima—the system must transition through lower-scoring configurations before arriving at a better MAP solution. This paper presents a new method of explicitly selecting fruitful downward jumps by leveraging reinforcement learning (RL). Rather than setting parameters to maximize the likelihood of the training data, parameters of the factor graph are treated as a log-linear function approximator and learned with methods of temporal difference (TD); MAP inference is performed by executing the resulting policy on held out test data. Our method allows efficient gradient updates since only factors in the neighborhood of variables affected by an action need to be computed—we bypass the need to compute marginals entirely. Our method yields dramatic empirical success, producing new state-of-the-art results on a complex joint model of ontology alignment, with a 48% reduction in error over state-of-the-art in that domain. 1
5 0.16262366 209 nips-2009-Robust Value Function Approximation Using Bilinear Programming
Author: Marek Petrik, Shlomo Zilberstein
Abstract: Existing value function approximation methods have been successfully used in many applications, but they often lack useful a priori error bounds. We propose approximate bilinear programming, a new formulation of value function approximation that provides strong a priori guarantees. In particular, this approach provably finds an approximate value function that minimizes the Bellman residual. Solving a bilinear program optimally is NP-hard, but this is unavoidable because the Bellman-residual minimization itself is NP-hard. We therefore employ and analyze a common approximate algorithm for bilinear programs. The analysis shows that this algorithm offers a convergent generalization of approximate policy iteration. Finally, we demonstrate that the proposed approach can consistently minimize the Bellman residual on a simple benchmark problem. 1 Motivation Solving large Markov Decision Problems (MDPs) is a very useful, but computationally challenging problem addressed widely in the AI literature, particularly in the area of reinforcement learning. It is widely accepted that large MDPs can only be solved approximately. The commonly used approximation methods can be divided into three broad categories: 1) policy search, which explores a restricted space of all policies, 2) approximate dynamic programming, which searches a restricted space of value functions, and 3) approximate linear programming, which approximates the solution using a linear program. While all of these methods have achieved impressive results in many domains, they have significant limitations. Policy search methods rely on local search in a restricted policy space. The policy may be represented, for example, as a finite-state controller [22] or as a greedy policy with respect to an approximate value function [24]. Policy search methods have achieved impressive results in such domains as Tetris [24] and helicopter control [1]. However, they are notoriously hard to analyze. We are not aware of any theoretical guarantees regarding the quality of the solution. Approximate dynamic programming (ADP) methods iteratively approximate the value function [4, 20, 23]. They have been extensively analyzed and are the most commonly used methods. However, ADP methods typically do not converge and they only provide weak guarantees of approximation quality. The approximation error bounds are usually expressed in terms of the worst-case approximation of the value function over all policies [4]. In addition, most available bounds are with respect to the L∞ norm, while the algorithms often minimize the L2 norm. While there exist some L2 -based bounds [14], they require values that are difficult to obtain. Approximate linear programming (ALP) uses a linear program to compute the approximate value function in a particular vector space [7]. ALP has been previously used in a wide variety of settings [2, 9, 10]. Although ALP often does not perform as well as ADP, there have been some recent 1 efforts to close the gap [18]. ALP has better theoretical properties than ADP and policy search. It is guaranteed to converge and return the closest L1 -norm approximation v of the optimal value func˜ tion v ∗ up to a multiplicative factor. However, the L1 norm must be properly weighted to guarantee a small policy loss, and there is no reliable method for selecting appropriate weights [7]. To summarize, the existing reinforcement learning techniques often provide good solutions, but typically require significant domain knowledge [20]. The domain knowledge is needed partly because useful a priori error bounds are not available, as mentioned above. Our goal is to develop a more robust method that is guaranteed to minimize an actual bound on the policy loss. We present a new formulation of value function approximation that provably minimizes a bound on the policy loss. Unlike in some other algorithms, the bound in this case does not rely on values that are hard to obtain. The new method unifies policy search and value-function search methods to minimize the L∞ norm of the Bellman residual, which bounds the policy loss. We start with a description of the framework and notation in Section 2. Then, in Section 3, we describe the proposed Approximate Bilinear Programming (ABP) formulation. A drawback of this formulation is its computational complexity, which may be exponential. We show in Section 4 that this is unavoidable, because minimizing the approximation error bound is in fact NP-hard. Although our focus is on the formulation and its properties, we also discuss some simple algorithms for solving bilinear programs. Section 5 shows that ABP can be seen as an improvement of ALP and Approximate Policy Iteration (API). Section 6 demonstrates the applicability of ABP using a common reinforcement learning benchmark problem. A complete discussion of sampling strategies–an essential component for achieving robustness–is beyond the scope of this paper, but the issue is briefly discussed in Section 6. Complete proofs of the theorems can be found in [19]. 2 Solving MDPs using ALP In this section, we formally define MDPs, their ALP formulation, and the approximation errors involved. These notions serve as a basis for developing the ABP formulation. A Markov Decision Process is a tuple (S, A, P, r, α), where S is the finite set of states, A is the finite set of actions. P : S × S × A → [0, 1] is the transition function, where P (s , s, a) represents the probability of transiting to state s from state s, given action a. The function r : S × A → R is the reward function, and α : S → [0, 1] is the initial state distribution. The objective is to maximize the infinite-horizon discounted cumulative reward. To shorten the notation, we assume an arbitrary ordering of the states: s1 , s2 , . . . , sn . Then, Pa and ra are used to denote the probabilistic transition matrix and reward for action a. The solution of an MDP is a policy π : S × A → [0, 1] from a set of possible policies Π, such that for all s ∈ S, a∈A π(s, a) = 1. We assume that the policies may be stochastic, but stationary [21]. A policy is deterministic when π(s, a) ∈ {0, 1} for all s ∈ S and a ∈ A. The transition and reward functions for a given policy are denoted by Pπ and rπ . The value function update for a policy π is denoted by Lπ , and the Bellman operator is denoted by L. That is: Lπ v = Pπ v + rπ Lv = max Lπ v. π∈Π The optimal value function, denoted v ∗ , satisfies v ∗ = Lv ∗ . We focus on linear value function approximation for discounted infinite-horizon problems. In linear value function approximation, the value function is represented as a linear combination of nonlinear basis functions (vectors). For each state s, we define a row-vector φ(s) of features. The rows of the basis matrix M correspond to φ(s), and the approximation space is generated by the columns of the matrix. That is, the basis matrix M , and the value function v are represented as: − φ(s1 ) − M = − φ(s2 ) − v = M x. . . . Definition 1. A value function, v, is representable if v ∈ M ⊆ R|S| , where M = colspan (M ), and is transitive-feasible when v ≥ Lv. We denote the set of transitive-feasible value functions as: K = {v ∈ R|S| v ≥ Lv}. 2 Notice that the optimal value function v ∗ is transitive-feasible, and M is a linear space. Also, all the inequalities are element-wise. Because the new formulation is related to ALP, we introduce it first. It is well known that an infinite horizon discounted MDP problem may be formulated in terms of solving the following linear program: minimize v c(s)v(s) s∈S v(s) − γ s.t. P (s , s, a)v(s ) ≥ r(s, a) ∀(s, a) ∈ (S, A) (1) s ∈S We use A as a shorthand notation for the constraint matrix and b for the right-hand side. The value c represents a distribution over the states, usually a uniform one. That is, s∈S c(s) = 1. The linear program in Eq. (1) is often too large to be solved precisely, so it is approximated to get an approximate linear program by assuming that v ∈ M [8], as follows: minimize cT v x Av ≥ b s.t. (2) v∈M The constraint v ∈ M denotes the approximation. To actually solve this linear program, the value function is represented as v = M x. In the remainder of the paper, we assume that 1 ∈ M to guarantee the feasibility of the ALP, where 1 is a vector of all ones. The optimal solution of the ALP, v , satisfies that v ≥ v ∗ . Then, the objective of Eq. (2) represents the minimization of v − v ∗ 1,c , ˜ ˜ ˜ where · 1,c is a c-weighted L1 norm [7]. The ultimate goal of the optimization is not to obtain a good value function v , but a good policy. ˜ The quality of the policy, typically chosen to be greedy with respect to v , depends non-trivially on ˜ the approximate value function. The ABP formulation will minimize policy loss by minimizing L˜ − v ∞ , which bounds the policy loss as follows. v ˜ Theorem 2 (e.g. [25]). Let v be an arbitrary value function, and let v be the value of the greedy ˜ ˆ policy with respect to v . Then: ˜ 2 v∗ − v ∞ ≤ ˆ L˜ − v ∞ , v ˜ 1−γ In addition, if v ≥ L˜, the policy loss is smallest for the greedy policy. ˜ v Policies, like value functions, can be represented as vectors. Assume an arbitrary ordering of the state-action pairs, such that o(s, a) → N maps a state and an action to its position. The policies are represented as θ ∈ R|S|×|A| , and we use the shorthand notation θ(s, a) = θ(o(s, a)). Remark 3. The corresponding π and θ are denoted as π θ and θπ and satisfy: π θ (s, a) = θπ (s, a). We will also consider approximations of the policies in the policy-space, generated by columns of a matrix N . A policy is representable when π ∈ N , where N = colspan (N ). 3 Approximate Bilinear Programs This section shows how to formulate minv∈M Lv − v ∞ as a separable bilinear program. Bilinear programs are a generalization of linear programs with an additional bilinear term in the objective function. A separable bilinear program consists of two linear programs with independent constraints and are fairly easy to solve and analyze. Definition 4 (Separable Bilinear Program). A separable bilinear program in the normal form is defined as follows: T T minimize f (w, x, y, z) = sT w + r1 x + xT Cy + r2 y + sT z 1 2 w,x y,z s.t. A1 x + B1 w = b1 A2 y + B2 z = b2 w, x ≥ 0 y, z ≥ 0 3 (3) We separate the variables using a vertical line and the constraints using different columns to emphasize the separable nature of the bilinear program. In this paper, we only use separable bilinear programs and refer to them simply as bilinear programs. An approximate bilinear program can now be formulated as follows. minimize θT λ + λ θ λ,λ ,v Bθ = 1 z = Av − b s.t. θ≥0 z≥0 (4) λ+λ1≥z λ≥0 θ∈N v∈M All variables are vectors except λ , which is a scalar. The symbol z is only used to simplify the notation and does not need to represent an optimization variable. The variable v is defined for each state and represents the value function. Matrix A represents constraints that are identical to the constraints in Eq. (2). The variables λ correspond to all state-action pairs. These variables represent the Bellman residuals that are being minimized. The variables θ are defined for all state-action pairs and represent policies in Remark 3. The matrix B represents the following constraints: θ(s, a) = 1 ∀s ∈ S. a∈A As with approximate linear programs, we initially assume that all the constraints on z are used. In realistic settings, however, the constraints would be sampled or somehow reduced. We defer the discussion of this issue until Section 6. Note that the constraints in our formulation correspond to elements of z and θ. Thus when constraints are omitted, also the corresponding elements of z and θ are omitted. To simplify the notation, the value function approximation in this problem is denoted only implicitly by v ∈ M, and the policy approximation is denoted by θ ∈ N . In an actual implementation, the optimization variables would be x, y using the relationships v = M x and θ = N y. We do not assume any approximation of the policy space, unless mentioned otherwise. We also use v or θ to refer to partial solutions of Eq. (4) with the other variables chosen appropriately to achieve feasibility. The ABP formulation is closely related to approximate linear programs, and we discuss the connection in Section 5. We first analyze the properties of the optimal solutions of the bilinear program and then show and discuss the solution methods in Section 4. The following theorem states the main property of the bilinear formulation. ˜˜ ˜ ˜ Theorem 5. b Let (θ, v , λ, λ ) be an optimal solution of Eq. (4) and assume that 1 ∈ M. Then: ˜ ˜ ˜ θT λ + λ = L˜ − v v ˜ ∞ ≤ min v∈K∩M Lv − v ∞ ≤ 2 min Lv − v v∈M ∞ ≤ 2(1 + γ) min v − v ∗ v∈M ∞. ˜ In addition, π θ minimizes the Bellman residual with regard to v , and its value function v satisfies: ˜ ˆ 2 min Lv − v ∞ . v − v∗ ∞ ≤ ˆ 1 − γ v∈M The proof of the theorem can be found in [19]. It is important to note that, as Theorem 5 states, the ABP approach is equivalent to a minimization over all representable value functions, not only the transitive-feasible ones. Notice also the missing coefficient 2 (2 instead of 4) in the last equation of Theorem 5. This follows by subtracting a constant vector 1 from v to balance the lower bounds ˜ on the Bellman residual error with the upper ones. This modified approximate value function will have 1/2 of the original Bellman residual but an identical greedy policy. Finally, note that whenever v ∗ ∈ M, both ABP and ALP will return the optimal value function. The ABP solution minimizes the L∞ norm of the Bellman residual due to: 1) the correspondence between θ and the policies, and 2) the dual representation with respect to variables λ and λ . The theorem then follows using techniques similar to those used for approximate linear programs [7]. 4 Algorithm 1: Iterative algorithm for solving Eq. (3) (x0 , w0 ) ← random ; (y0 , z0 ) ← arg miny,z f (w0 , x0 , y, z) ; i←1; while yi−1 = yi or xi−1 = xi do (yi , zi ) ← arg min{y,z A2 y+B2 z=b2 y,z≥0} f (wi−1 , xi−1 , y, z) ; (xi , wi ) ← arg min{x,w A1 x+B1 w=b1 x,w≥0} f (w, x, yi , zi ) ; i←i+1 return f (wi , xi , yi , zi ) 4 Solving Bilinear Programs In this section we describe simple methods for solving ABPs. We first describe optimal methods, which have exponential complexity, and then discuss some approximation strategies. Solving a bilinear program is an NP-complete problem [3]. The membership in NP follows from the finite number of basic feasible solutions of the individual linear programs, each of which can be checked in polynomial time. The NP-hardness is shown by a reduction from the SAT problem [3]. The NP-completeness of ABP compares unfavorably with the polynomial complexity of ALP. However, most other ADP algorithms are not guaranteed to converge to a solution in finite time. The following theorem shows that the computational complexity of the ABP formulation is asymptotically the same as the complexity of the problem it solves. Theorem 6. b Determining minv∈K∩M Lv − v ∞ < is NP-complete for the full constraint representation, 0 < γ < 1, and a given > 0. In addition, the problem remains NP-complete when 1 ∈ M, and therefore minv∈M Lv − v ∞ < is also NP-complete. As the theorem states, the value function approximation does not become computationally simpler even when 1 ∈ M – a universal assumption in the paper. Notice that ALP can determine whether minv∈K∩M Lv − v ∞ = 0 in polynomial time. The proof of Theorem 6 is based on a reduction from SAT and can be found in [19]. The policy in the reduction determines the true literal in each clause, and the approximate value function corresponds to the truth value of the literals. The approximation basis forces literals that share the same variable to have consistent values. Bilinear programs are non-convex and are typically solved using global optimization techniques. The common solution methods are based on concave cuts [11] or branch-and-bound [6]. In ABP settings with a small number of features, the successive approximation algorithm [17] may be applied efficiently. We are, however, not aware of commercial solvers available for solving bilinear programs. Bilinear programs can be formulated as concave quadratic minimization problems [11], or mixed integer linear programs [11, 16], for which there are numerous commercial solvers available. Because we are interested in solving very large bilinear programs, we describe simple approximate algorithms next. Optimal scalable methods are beyond the scope of this paper. The most common approximate method for solving bilinear programs is shown in Algorithm 1. It is designed for the general formulation shown in Eq. (3), where f (w, x, y, z) represents the objective function. The minimizations in the algorithm are linear programs which can be easily solved. Interestingly, as we will show in Section 5, Algorithm 1 applied to ABP generalizes a version of API. While Algorithm 1 is not guaranteed to find an optimal solution, its empirical performance is often remarkably good [13]. Its basic properties are summarized by the following proposition. Proposition 7 (e.g. [3]). Algorithm 1 is guaranteed to converge, assuming that the linear program solutions are in a vertex of the optimality simplex. In addition, the global optimum is a fixed point of the algorithm, and the objective value monotonically improves during execution. 5 The proof is based on the finite count of the basic feasible solutions of the individual linear programs. Because the objective function does not increase in any iteration, the algorithm will eventually converge. In the context of MDPs, Algorithm 1 can be further refined. For example, the constraint v ∈ M in Eq. (4) serves mostly to simplify the bilinear program and a value function that violates it may still be acceptable. The following proposition motivates the construction of a new value function from two transitive-feasible value functions. Proposition 8. Let v1 and v2 be feasible value functions in Eq. (4). Then the value function ˜ ˜ v (s) = min{˜1 (s), v2 (s)} is also feasible in Eq. (4). Therefore v ≥ v ∗ and v ∗ − v ∞ ≤ ˜ v ˜ ˜ ˜ min { v ∗ − v1 ∞ , v ∗ − v2 ∞ }. ˜ ˜ The proof of the proposition is based on Jensen’s inequality and can be found in [19]. Proposition 8 can be used to extend Algorithm 1 when solving ABPs. One option is to take the state-wise minimum of values from multiple random executions of Algorithm 1, which preserves the transitive feasibility of the value function. However, the increasing number of value functions used to obtain v also increases the potential sampling error. ˜ 5 Relationship to ALP and API In this section, we describe the important connections between ABP and the two closely related ADP methods: ALP, and API with L∞ minimization. Both of these methods are commonly used, for example to solve factored MDPs [10]. Our analysis sheds light on some of their observed properties and leads to a new convergent form of API. ABP addresses some important issues with ALP: 1) ALP provides value function bounds with respect to L1 norm, which does not guarantee small policy loss, 2) ALP’s solution quality depends significantly on the heuristically-chosen objective function c in Eq. (2) [7], and 3) incomplete constraint samples in ALP easily lead to unbounded linear programs. The drawback of using ABP, however, is the higher computational complexity. Both the first and the second issues in ALP can be addressed by choosing the right objective function [7]. Because this objective function depends on the optimal ALP solution, it cannot be practically computed. Instead, various heuristics are usually used. The heuristic objective functions may lead to significant improvements in specific domains, but they do not provide any guarantees. ABP, on the other hand, has no such parameters that require adjustments. The third issue arises when the constraints of an ALP need to be sampled in some large domains. The ALP may become unbounded with incomplete samples because its objective value is defined using the L1 norm on the states, and the constraints are defined using the L∞ norm of the Bellman residual. In ABP, the Bellman residual is used in both the constraints and objective function. The objective function of ABP is then bounded below by 0 for an arbitrarily small number of samples. ABP can also improve on API with L∞ minimization (L∞ -API for short), which is a leading method for solving factored MDPs [10]. Minimizing the L∞ approximation error is theoretically preferable, since it is compatible with the existing bounds on policy loss [10]. In contrast, few practical bounds exist for API with the L2 norm minimization [14], such as LSPI [12]. L∞ -API is shown in Algorithm 2, where f (π) is calculated using the following program: minimize φ φ,v s.t. (I − γPπ )v + 1φ ≥ rπ −(I − γPπ )v + 1φ ≥ −rπ (5) v∈M Here I denotes the identity matrix. We are not aware of a convergence or a divergence proof of L∞ -API, and this analysis is beyond the scope of this paper. 6 Algorithm 2: Approximate policy iteration, where f (π) denotes a custom value function approximation for the policy π. π0 , k ← rand, 1 ; while πk = πk−1 do vk ← f (πk−1 ) ; ˜ πk (s) ← arg maxa∈A r(s, a) + γ s ∈S P (s , s, a)˜k (s) ∀s ∈ S ; v k ←k+1 We propose Optimistic Approximate Policy Iteration (OAPI), a modification of API. OAPI is shown in Algorithm 2, where f (π) is calculated using the following program: minimize φ φ,v s.t. Av ≥ b (≡ (I − γPπ )v ≥ rπ ∀π ∈ Π) −(I − γPπ )v + 1φ ≥ −rπ (6) v∈M In fact, OAPI corresponds to Algorithm 1 applied to ABP because Eq. (6) corresponds to Eq. (4) with fixed θ. Then, using Proposition 7, we get the following corollary. Corollary 9. Optimistic approximate policy iteration converges in finite time. In addition, the Bellman residual of the generated value functions monotonically decreases. OAPI differs from L∞ -API in two ways: 1) OAPI constrains the Bellman residuals by 0 from below and by φ from above, and then it minimizes φ. L∞ -API constrains the Bellman residuals by φ from both above and below. 2) OAPI, like API, uses only the current policy for the upper bound on the Bellman residual, but uses all the policies for the lower bound on the Bellman residual. L∞ -API cannot return an approximate value function that has a lower Bellman residual than ABP, given the optimality of ABP described in Theorem 5. However, even OAPI, an approximate ABP algorithm, performs comparably to L∞ -API, as the following theorem states. Theorem 10. b Assume that L∞ -API converges to a policy π and a value function v that both φ satisfy: φ = v − Lπ v ∞ = v − Lv ∞ . Then v = v + 1−γ 1 is feasible in Eq. (4), and it is a fixed ˜ point of OAPI. In addition, the greedy policies with respect to v and v are identical. ˜ The proof is based on two facts. First, v is feasible with respect to the constraints in Eq. (4). The ˜ Bellman residual changes for all the policies identically, since a constant vector is added. Second, because Lπ is greedy with respect to v , we have that v ≥ Lπ v ≥ L˜. The value function v is ˜ ˜ ˜ v ˜ therefore transitive-feasible. The full proof can be found in [19]. To summarize, OAPI guarantees convergence, while matching the performance of L∞ -API. The convergence of OAPI is achieved because given a non-negative Bellman residual, the greedy policy also minimizes the Bellman residual. Because OAPI ensures that the Bellman residual is always non-negative, it can progressively reduce it. In comparison, the greedy policy in L∞ -API does not minimize the Bellman residual, and therefore L∞ -API does not always reduce it. Theorem 10 also explains why API provides better solutions than ALP, as observed in [10]. From the discussion above, ALP can be seen as an L1 -norm approximation of a single iteration of OAPI. L∞ -API, on the other hand, performs many such ALP-like iterations. 6 Empirical Evaluation As we showed in Theorem 10, even OAPI, the very simple approximate algorithm for ABP, can perform as well as existing state-of-the art methods on factored MDPs. However, a deeper understanding of the formulation and potential solution methods will be necessary in order to determine the full practical impact of the proposed methods. In this section, we validate the approach by applying it to the mountain car problem, a simple reinforcement learning benchmark problem. We have so far considered that all the constraints involving z are present in the ABP in Eq. (4). Because the constraints correspond to all state-action pairs, it is often impractical to even enumerate 7 (a) L∞ error of the Bellman residual Features 100 144 OAPI 0.21 (0.23) 0.13 (0.1) ALP 13. (13.) 3.6 (4.3) LSPI 9. (14.) 3.9 (7.7) API 0.46 (0.08) 0.86 (1.18) (b) L2 error of the Bellman residual Features 100 144 OAPI 0.2 (0.3) 0.1 (1.9) ALP 9.5 (18.) 0.3 (0.4) LSPI 1.2 (1.5) 0.9 (0.1) API 0.04 (0.01) 0.08 (0.08) Table 1: Bellman residual of the final value function. The values are averages over 5 executions, with the standard deviations shown in parentheses. them. This issue can be addressed in at least two ways. First, a small randomly-selected subset of the constraints can be used in the ABP, a common approach in ALP [9, 5]. The ALP sampling bounds can be easily extended to ABP. Second, the structure of the MDP can be used to reduce the number of constraints. Such a reduction is possible, for example, in factored MDPs with L∞ -API and ALP [10], and can be easily extended to OAPI and ABP. In the mountain-car benchmark, an underpowered car needs to climb a hill [23]. To do so, it first needs to back up to an opposite hill to gain sufficient momentum. The car receives a reward of 1 when it climbs the hill. In the experiments we used a discount factor γ = 0.99. The experiments are designed to determine whether OAPI reliably minimizes the Bellman residual in comparison with API and ALP. We use a uniformly-spaced linear spline to approximate the value function. The constraints were based on 200 uniformly sampled states with all 3 actions per state. We evaluated the methods with the number of the approximation features 100 and 144, which corresponds to the number of linear segments. The results of ABP (in particular OAPI), ALP, API with L2 minimization, and LSPI are depicted in Table 1. The results are shown for both L∞ norm and uniformly-weighted L2 norm. The runtimes of all these methods are comparable, with ALP being the fastest. Since API (LSPI) is not guaranteed to converge, we ran it for at most 20 iterations, which was an upper bound on the number of iterations of OAPI. The results demonstrate that ABP minimizes the L∞ Bellman residual much more consistently than the other methods. Note, however, that all the considered algorithms would perform significantly better given a finer approximation. 7 Conclusion and Future Work We proposed and analyzed approximate bilinear programming, a new value-function approximation method, which provably minimizes the L∞ Bellman residual. ABP returns the optimal approximate value function with respect to the Bellman residual bounds, despite the formulation with regard to transitive-feasible value functions. We also showed that there is no asymptotically simpler formulation, since finding the closest value function and solving a bilinear program are both NP-complete problems. Finally, the formulation leads to the development of OAPI, a new convergent form of API which monotonically improves the objective value function. While we only discussed approximate solutions of the ABP, a deeper study of bilinear solvers may render optimal solution methods feasible. ABPs have a small number of essential variables (that determine the value function) and a large number of constraints, which can be leveraged by the solvers [15]. The L∞ error bound provides good theoretical guarantees, but it may be too conservative in practice. A similar formulation based on L2 norm minimization may be more practical. We believe that the proposed formulation will help to deepen the understanding of value function approximation and the characteristics of existing solution methods, and potentially lead to the development of more robust and widely-applicable reinforcement learning algorithms. Acknowledgements This work was supported by the Air Force Office of Scientific Research under Grant No. FA955008-1-0171. We also thank the anonymous reviewers for their useful comments. 8 References [1] Pieter Abbeel, Varun Ganapathi, and Andrew Y. Ng. Learning vehicular dynamics, with application to modeling helicopters. In Advances in Neural Information Processing Systems, pages 1–8, 2006. [2] Daniel Adelman. A price-directed approach to stochastic inventory/routing. Operations Research, 52:499–514, 2004. [3] Kristin P. Bennett and O. L. Mangasarian. Bilinear separation of two sets in n-space. Technical report, Computer Science Department, University of Wisconsin, 1992. [4] Dimitri P. Bertsekas and Sergey Ioffe. Temporal differences-based policy iteration and applications in neuro-dynamic programming. Technical Report LIDS-P-2349, LIDS, 1997. [5] Guiuseppe Calafiore and M.C. Campi. Uncertain convex programs: Randomized solutions and confidence levels. Mathematical Programming, Series A, 102:25–46, 2005. [6] Alberto Carpara and Michele Monaci. Bidimensional packing by bilinear programming. Mathematical Programming Series A, 118:75–108, 2009. [7] Daniela P. de Farias. The Linear Programming Approach to Approximate Dynamic Programming: Theory and Application. PhD thesis, Stanford University, 2002. [8] Daniela P. de Farias and Ben Van Roy. The linear programming approach to approximate dynamic programming. Operations Research, 51:850–856, 2003. [9] Daniela Pucci de Farias and Benjamin Van Roy. On constraint sampling in the linear programming approach to approximate dynamic programming. Mathematics of Operations Research, 29(3):462–478, 2004. [10] Carlos Guestrin, Daphne Koller, Ronald Parr, and Shobha Venkataraman. Efficient solution algorithms for factored MDPs. Journal of Artificial Intelligence Research, 19:399–468, 2003. [11] Reiner Horst and Hoang Tuy. Global optimization: Deterministic approaches. Springer, 1996. [12] Michail G. Lagoudakis and Ronald Parr. Least-squares policy iteration. Journal of Machine Learning Research, 4:1107–1149, 2003. [13] O. L. Mangasarian. The linear complementarity problem as a separable bilinear program. Journal of Global Optimization, 12:1–7, 1995. [14] Remi Munos. Error bounds for approximate policy iteration. In International Conference on Machine Learning, pages 560–567, 2003. [15] Marek Petrik and Shlomo Zilberstein. Anytime coordination using separable bilinear programs. In Conference on Artificial Intelligence, pages 750–755, 2007. [16] Marek Petrik and Shlomo Zilberstein. Average reward decentralized Markov decision processes. In International Joint Conference on Artificial Intelligence, pages 1997–2002, 2007. [17] Marek Petrik and Shlomo Zilberstein. A bilinear programming approach for multiagent planning. Journal of Artificial Intelligence Research, 35:235–274, 2009. [18] Marek Petrik and Shlomo Zilberstein. Constraint relaxation in approximate linear programs. In International Conference on Machine Learning, pages 809–816, 2009. [19] Marek Petrik and Shlomo Zilberstein. Robust value function approximation using bilinear programming. Technical Report UM-CS-2009-052, Department of Computer Science, University of Massachusetts Amherst, 2009. [20] Warren B. Powell. Approximate Dynamic Programming. Wiley-Interscience, 2007. [21] Martin L. Puterman. Markov decision processes: Discrete stochastic dynamic programming. John Wiley & Sons, Inc., 2005. [22] Kenneth O. Stanley and Risto Miikkulainen. Competitive coevolution through evolutionary complexification. Journal of Artificial Intelligence Research, 21:63–100, 2004. [23] Richard S. Sutton and Andrew Barto. Reinforcement learning. MIT Press, 1998. [24] Istvan Szita and Andras Lorincz. Learning Tetris using the noisy cross-entropy method. Neural Computation, 18(12):2936–2941, 2006. [25] Ronald J. Williams and Leemon C. Baird. Tight performance bounds on greedy policies based on imperfect value functions. In Yale Workshop on Adaptive and Learning Systems, 1994. 9
6 0.14517483 134 nips-2009-Learning to Explore and Exploit in POMDPs
7 0.14329486 12 nips-2009-A Generalized Natural Actor-Critic Algorithm
8 0.13269897 53 nips-2009-Complexity of Decentralized Control: Special Cases
9 0.12869009 14 nips-2009-A Parameter-free Hedging Algorithm
10 0.106911 221 nips-2009-Solving Stochastic Games
11 0.095473662 218 nips-2009-Skill Discovery in Continuous Reinforcement Learning Domains using Skill Chaining
12 0.08864066 60 nips-2009-Convergent Temporal-Difference Learning with Arbitrary Smooth Function Approximation
13 0.0759537 159 nips-2009-Multi-Step Dyna Planning for Policy Evaluation and Control
14 0.072656743 54 nips-2009-Compositionality of optimal control laws
15 0.061074883 156 nips-2009-Monte Carlo Sampling for Regret Minimization in Extensive Games
16 0.060344931 16 nips-2009-A Smoothed Approximate Linear Program
17 0.056914069 49 nips-2009-Breaking Boundaries Between Induction Time and Diagnosis Time Active Information Acquisition
18 0.045614325 33 nips-2009-Analysis of SVM with Indefinite Kernels
19 0.04232211 39 nips-2009-Bayesian Belief Polarization
20 0.041793462 107 nips-2009-Help or Hinder: Bayesian Models of Social Goal Inference
topicId topicWeight
[(0, -0.142), (1, 0.029), (2, 0.196), (3, -0.231), (4, -0.314), (5, 0.033), (6, 0.051), (7, -0.021), (8, 0.007), (9, 0.021), (10, 0.084), (11, 0.099), (12, -0.006), (13, 0.062), (14, -0.007), (15, -0.035), (16, -0.018), (17, -0.02), (18, 0.013), (19, -0.033), (20, 0.013), (21, -0.102), (22, 0.113), (23, -0.016), (24, -0.14), (25, -0.01), (26, -0.12), (27, 0.025), (28, 0.008), (29, -0.003), (30, -0.062), (31, -0.024), (32, 0.039), (33, 0.041), (34, -0.091), (35, 0.087), (36, -0.014), (37, 0.008), (38, -0.006), (39, -0.015), (40, 0.085), (41, -0.001), (42, 0.087), (43, -0.009), (44, -0.025), (45, -0.041), (46, -0.003), (47, -0.08), (48, 0.028), (49, 0.024)]
simIndex simValue paperId paperTitle
same-paper 1 0.9562 113 nips-2009-Improving Existing Fault Recovery Policies
Author: Guy Shani, Christopher Meek
Abstract: An automated recovery system is a key component in a large data center. Such a system typically employs a hand-made controller created by an expert. While such controllers capture many important aspects of the recovery process, they are often not systematically optimized to reduce costs such as server downtime. In this paper we describe a passive policy learning approach for improving existing recovery policies without exploration. We explain how to use data gathered from the interactions of the hand-made controller with the system, to create an improved controller. We suggest learning an indefinite horizon Partially Observable Markov Decision Process, a model for decision making under uncertainty, and solve it using a point-based algorithm. We describe the complete process, starting with data gathering, model learning, model checking procedures, and computing a policy. 1
2 0.85084504 145 nips-2009-Manifold Embeddings for Model-Based Reinforcement Learning under Partial Observability
Author: Keith Bush, Joelle Pineau
Abstract: Interesting real-world datasets often exhibit nonlinear, noisy, continuous-valued states that are unexplorable, are poorly described by first principles, and are only partially observable. If partial observability can be overcome, these constraints suggest the use of model-based reinforcement learning. We experiment with manifold embeddings to reconstruct the observable state-space in the context of offline, model-based reinforcement learning. We demonstrate that the embedding of a system can change as a result of learning, and we argue that the best performing embeddings well-represent the dynamics of both the uncontrolled and adaptively controlled system. We apply this approach to learn a neurostimulation policy that suppresses epileptic seizures on animal brain slices. 1
3 0.79816025 134 nips-2009-Learning to Explore and Exploit in POMDPs
Author: Chenghui Cai, Xuejun Liao, Lawrence Carin
Abstract: A fundamental objective in reinforcement learning is the maintenance of a proper balance between exploration and exploitation. This problem becomes more challenging when the agent can only partially observe the states of its environment. In this paper we propose a dual-policy method for jointly learning the agent behavior and the balance between exploration exploitation, in partially observable environments. The method subsumes traditional exploration, in which the agent takes actions to gather information about the environment, and active learning, in which the agent queries an oracle for optimal actions (with an associated cost for employing the oracle). The form of the employed exploration is dictated by the specific problem. Theoretical guarantees are provided concerning the optimality of the balancing of exploration and exploitation. The effectiveness of the method is demonstrated by experimental results on benchmark problems.
4 0.77441496 12 nips-2009-A Generalized Natural Actor-Critic Algorithm
Author: Tetsuro Morimura, Eiji Uchibe, Junichiro Yoshimoto, Kenji Doya
Abstract: Policy gradient Reinforcement Learning (RL) algorithms have received substantial attention, seeking stochastic policies that maximize the average (or discounted cumulative) reward. In addition, extensions based on the concept of the Natural Gradient (NG) show promising learning efficiency because these regard metrics for the task. Though there are two candidate metrics, Kakade’s Fisher Information Matrix (FIM) for the policy (action) distribution and Morimura’s FIM for the stateaction joint distribution, but all RL algorithms with NG have followed Kakade’s approach. In this paper, we describe a generalized Natural Gradient (gNG) that linearly interpolates the two FIMs and propose an efficient implementation for the gNG learning based on a theory of the estimating function, the generalized Natural Actor-Critic (gNAC) algorithm. The gNAC algorithm involves a near optimal auxiliary function to reduce the variance of the gNG estimates. Interestingly, the gNAC can be regarded as a natural extension of the current state-of-the-art NAC algorithm [1], as long as the interpolating parameter is appropriately selected. Numerical experiments showed that the proposed gNAC algorithm can estimate gNG efficiently and outperformed the NAC algorithm.
5 0.74596441 159 nips-2009-Multi-Step Dyna Planning for Policy Evaluation and Control
Author: Hengshuai Yao, Shalabh Bhatnagar, Dongcui Diao, Richard S. Sutton, Csaba Szepesvári
Abstract: In this paper we introduce a multi-step linear Dyna-style planning algorithm. The key element of the multi-step linear Dyna is a multi-step linear model that enables multi-step projection of a sampled feature and multi-step planning based on the simulated multi-step transition experience. We propose two multi-step linear models. The first iterates the one-step linear model, but is generally computationally complex. The second interpolates between the one-step model and the infinite-step model (which turns out to be the LSTD solution), and can be learned efficiently online. Policy evaluation on Boyan Chain shows that multi-step linear Dyna learns a policy faster than single-step linear Dyna, and generally learns faster as the number of projection steps increases. Results on Mountain-car show that multi-step linear Dyna leads to much better online performance than single-step linear Dyna and model-free algorithms; however, the performance of multi-step linear Dyna does not always improve as the number of projection steps increases. Our results also suggest that previous attempts on extending LSTD for online control were unsuccessful because LSTD looks infinite steps into the future, and suffers from the model errors in non-stationary (control) environments.
6 0.69824958 209 nips-2009-Robust Value Function Approximation Using Bilinear Programming
7 0.6709379 250 nips-2009-Training Factor Graphs with Reinforcement Learning for Efficient MAP Inference
8 0.60859567 60 nips-2009-Convergent Temporal-Difference Learning with Arbitrary Smooth Function Approximation
9 0.60761613 242 nips-2009-The Infinite Partially Observable Markov Decision Process
10 0.58328068 218 nips-2009-Skill Discovery in Continuous Reinforcement Learning Domains using Skill Chaining
11 0.56421524 16 nips-2009-A Smoothed Approximate Linear Program
12 0.50725567 14 nips-2009-A Parameter-free Hedging Algorithm
13 0.49905112 53 nips-2009-Complexity of Decentralized Control: Special Cases
14 0.4474676 221 nips-2009-Solving Stochastic Games
15 0.37004176 54 nips-2009-Compositionality of optimal control laws
16 0.3593083 150 nips-2009-Maximum likelihood trajectories for continuous-time Markov chains
17 0.32219714 107 nips-2009-Help or Hinder: Bayesian Models of Social Goal Inference
18 0.30583563 106 nips-2009-Heavy-Tailed Symmetric Stochastic Neighbor Embedding
19 0.2616114 69 nips-2009-Discrete MDL Predicts in Total Variation
20 0.2604467 137 nips-2009-Learning transport operators for image manifolds
topicId topicWeight
[(7, 0.023), (16, 0.243), (24, 0.034), (25, 0.058), (35, 0.096), (36, 0.075), (39, 0.052), (58, 0.078), (61, 0.07), (71, 0.1), (81, 0.012), (86, 0.057), (91, 0.011)]
simIndex simValue paperId paperTitle
same-paper 1 0.76888478 113 nips-2009-Improving Existing Fault Recovery Policies
Author: Guy Shani, Christopher Meek
Abstract: An automated recovery system is a key component in a large data center. Such a system typically employs a hand-made controller created by an expert. While such controllers capture many important aspects of the recovery process, they are often not systematically optimized to reduce costs such as server downtime. In this paper we describe a passive policy learning approach for improving existing recovery policies without exploration. We explain how to use data gathered from the interactions of the hand-made controller with the system, to create an improved controller. We suggest learning an indefinite horizon Partially Observable Markov Decision Process, a model for decision making under uncertainty, and solve it using a point-based algorithm. We describe the complete process, starting with data gathering, model learning, model checking procedures, and computing a policy. 1
2 0.61674798 250 nips-2009-Training Factor Graphs with Reinforcement Learning for Efficient MAP Inference
Author: Khashayar Rohanimanesh, Sameer Singh, Andrew McCallum, Michael J. Black
Abstract: Large, relational factor graphs with structure defined by first-order logic or other languages give rise to notoriously difficult inference problems. Because unrolling the structure necessary to represent distributions over all hypotheses has exponential blow-up, solutions are often derived from MCMC. However, because of limitations in the design and parameterization of the jump function, these samplingbased methods suffer from local minima—the system must transition through lower-scoring configurations before arriving at a better MAP solution. This paper presents a new method of explicitly selecting fruitful downward jumps by leveraging reinforcement learning (RL). Rather than setting parameters to maximize the likelihood of the training data, parameters of the factor graph are treated as a log-linear function approximator and learned with methods of temporal difference (TD); MAP inference is performed by executing the resulting policy on held out test data. Our method allows efficient gradient updates since only factors in the neighborhood of variables affected by an action need to be computed—we bypass the need to compute marginals entirely. Our method yields dramatic empirical success, producing new state-of-the-art results on a complex joint model of ontology alignment, with a 48% reduction in error over state-of-the-art in that domain. 1
3 0.61458552 215 nips-2009-Sensitivity analysis in HMMs with application to likelihood maximization
Author: Pierre-arnaud Coquelin, Romain Deguest, Rémi Munos
Abstract: This paper considers a sensitivity analysis in Hidden Markov Models with continuous state and observation spaces. We propose an Infinitesimal Perturbation Analysis (IPA) on the filtering distribution with respect to some parameters of the model. We describe a methodology for using any algorithm that estimates the filtering density, such as Sequential Monte Carlo methods, to design an algorithm that estimates its gradient. The resulting IPA estimator is proven to be asymptotically unbiased, consistent and has computational complexity linear in the number of particles. We consider an application of this analysis to the problem of identifying unknown parameters of the model given a sequence of observations. We derive an IPA estimator for the gradient of the log-likelihood, which may be used in a gradient method for the purpose of likelihood maximization. We illustrate the method with several numerical experiments.
4 0.6123991 242 nips-2009-The Infinite Partially Observable Markov Decision Process
Author: Finale Doshi-velez
Abstract: The Partially Observable Markov Decision Process (POMDP) framework has proven useful in planning domains where agents must balance actions that provide knowledge and actions that provide reward. Unfortunately, most POMDPs are complex structures with a large number of parameters. In many real-world problems, both the structure and the parameters are difficult to specify from domain knowledge alone. Recent work in Bayesian reinforcement learning has made headway in learning POMDP models; however, this work has largely focused on learning the parameters of the POMDP model. We define an infinite POMDP (iPOMDP) model that does not require knowledge of the size of the state space; instead, it assumes that the number of visited states will grow as the agent explores its world and only models visited states explicitly. We demonstrate the iPOMDP on several standard problems. 1
5 0.60295427 159 nips-2009-Multi-Step Dyna Planning for Policy Evaluation and Control
Author: Hengshuai Yao, Shalabh Bhatnagar, Dongcui Diao, Richard S. Sutton, Csaba Szepesvári
Abstract: In this paper we introduce a multi-step linear Dyna-style planning algorithm. The key element of the multi-step linear Dyna is a multi-step linear model that enables multi-step projection of a sampled feature and multi-step planning based on the simulated multi-step transition experience. We propose two multi-step linear models. The first iterates the one-step linear model, but is generally computationally complex. The second interpolates between the one-step model and the infinite-step model (which turns out to be the LSTD solution), and can be learned efficiently online. Policy evaluation on Boyan Chain shows that multi-step linear Dyna learns a policy faster than single-step linear Dyna, and generally learns faster as the number of projection steps increases. Results on Mountain-car show that multi-step linear Dyna leads to much better online performance than single-step linear Dyna and model-free algorithms; however, the performance of multi-step linear Dyna does not always improve as the number of projection steps increases. Our results also suggest that previous attempts on extending LSTD for online control were unsuccessful because LSTD looks infinite steps into the future, and suffers from the model errors in non-stationary (control) environments.
6 0.59700727 145 nips-2009-Manifold Embeddings for Model-Based Reinforcement Learning under Partial Observability
7 0.5967958 28 nips-2009-An Additive Latent Feature Model for Transparent Object Recognition
8 0.59580058 18 nips-2009-A Stochastic approximation method for inference in probabilistic graphical models
9 0.59550327 40 nips-2009-Bayesian Nonparametric Models on Decomposable Graphs
10 0.59048921 218 nips-2009-Skill Discovery in Continuous Reinforcement Learning Domains using Skill Chaining
11 0.59005028 19 nips-2009-A joint maximum-entropy model for binary neural population patterns and continuous signals
12 0.5885359 41 nips-2009-Bayesian Source Localization with the Multivariate Laplace Prior
13 0.58729869 226 nips-2009-Spatial Normalized Gamma Processes
14 0.58603603 3 nips-2009-AUC optimization and the two-sample problem
15 0.58601904 132 nips-2009-Learning in Markov Random Fields using Tempered Transitions
16 0.58536726 107 nips-2009-Help or Hinder: Bayesian Models of Social Goal Inference
17 0.5835824 155 nips-2009-Modelling Relational Data using Bayesian Clustered Tensor Factorization
18 0.58352965 204 nips-2009-Replicated Softmax: an Undirected Topic Model
19 0.58287245 97 nips-2009-Free energy score space
20 0.58187491 66 nips-2009-Differential Use of Implicit Negative Evidence in Generative and Discriminative Language Learning