Thompson sampling
This articleneeds additional citations forverification.(May 2012) |
Thompson sampling,[1][2][3]named afterWilliam R. Thompson,is aheuristicfor choosing actions that address theexploration-exploitation dilemmain themulti-armed banditproblem. It consists of choosing the action that maximizes the expected reward with respect to a randomly drawn belief.
Description
[edit]This section includes alist of references,related reading,orexternal links,but its sources remain unclear because it lacksinline citations.(May 2012) |
Consider a set of contexts,a set of actions,and rewards in.The aim of the player is to play actions under the various contexts, such as to maximize the cumulative rewards. Specifically, in each round, the player obtains a context,plays an actionand receives a rewardfollowing a distribution that depends on the context and the issued action.
The elements of Thompson sampling are as follows:
- a likelihood function;
- a setof parametersof the distribution of;
- a prior distributionon these parameters;
- past observations triplets;
- a posterior distribution,whereis the likelihood function.
Thompson sampling consists of playing the actionaccording to the probability that it maximizes the expected reward; actionis chosen with probability
whereis theindicator function.
In practice, the rule is implemented by sampling. In each round, parametersare sampled from the posterior,and an actionchosen that maximizes,i.e. the expected reward given the sampled parameters, the action, and the current context. Conceptually, this means that the player instantiates their beliefs randomly in each round according to the posterior distribution, and then acts optimally according to them. In most practical applications, it is computationally onerous to maintain and sample from a posterior distribution over models. As such, Thompson sampling is often used in conjunction with approximate sampling techniques.[3]
History
[edit]Thompson sampling was originally described by Thompson in 1933.[1]It was subsequently rediscovered numerous times independently in the context of multi-armed bandit problems.[4][5][6][7][8][9]A first proof of convergence for the bandit case has been shown in 1997.[4]The first application toMarkov decision processeswas in 2000.[6]A related approach (seeBayesian control rule) was published in 2010.[5]In 2010 it was also shown that Thompson sampling isinstantaneously self-correcting.[9]Asymptotic convergence results for contextual bandits were published in 2011.[7]Thompson Sampling has been widely used in many online learning problems including A/B testing in website design and online advertising,[10]and accelerated learning in decentralized decision making.[11]A Double Thompson Sampling (D-TS)[12]algorithm has been proposed fordueling bandits,a variant of traditional MAB, where feedback comes in the form of pairwise comparison.
Relationship to other approaches
[edit]Probability matching
[edit]Probability matching is a decision strategy in which predictions of class membership are proportional to the class base rates. Thus, if in the training set positive examples are observed 60% of the time, and negative examples are observed 40% of the time, the observer using a probability-matching strategy will predict (for unlabeled examples) a class label of "positive" on 60% of instances, and a class label of "negative" on 40% of instances.
Bayesian control rule
[edit]A generalization of Thompson sampling to arbitrary dynamical environments and causal structures, known asBayesian control rule,has been shown to be the optimal solution to the adaptive coding problem with actions and observations.[5]In this formulation, an agent is conceptualized as a mixture over a set of behaviours. As the agent interacts with its environment, it learns the causal properties and adopts the behaviour that minimizes the relative entropy to the behaviour with the best prediction of the environment's behaviour. If these behaviours have been chosen according to the maximum expected utility principle, then the asymptotic behaviour of the Bayesian control rule matches the asymptotic behaviour of the perfectly rational agent.
The setup is as follows. Letbe the actions issued by an agent up to time,and letbe the observations gathered by the agent up to time.Then, the agent issues the actionwith probability:[5]
where the "hat" -notationdenotes the fact thatis a causal intervention (seeCausality), and not an ordinary observation. If the agent holds beliefsover its behaviors, then the Bayesian control rule becomes
- ,
whereis the posterior distribution over the parametergiven actionsand observations.
In practice, the Bayesian control amounts to sampling, at each time step, a parameterfrom the posterior distribution,where the posterior distribution is computed using Bayes' rule by only considering the (causal) likelihoods of the observationsand ignoring the (causal) likelihoods of the actions,and then by sampling the actionfrom the action distribution.
Upper-Confidence-Bound (UCB) algorithms
[edit]Thompson sampling and upper-confidence bound algorithms share a fundamental property that underlies many of their theoretical guarantees. Roughly speaking, both algorithms allocate exploratory effort to actions that might be optimal and are in this sense "optimistic". Leveraging this property, one can translate regret bounds established for UCB algorithms to Bayesian regret bounds for Thompson sampling[13]or unify regret analysis across both these algorithms and many classes of problems.[14]
References
[edit]- ^ab Thompson, William R."On the likelihood that one unknown probability exceeds another in view of the evidence of two samples".Biometrika,25(3–4):285–294, 1933.
- ^ Thompson, W. R. (1935). On the theory of apportionment.American Journal of Mathematics,57(2), 450-456.
- ^ab Daniel J. Russo, Benjamin Van Roy, Abbas Kazerouni, Ian Osband and Zheng Wen (2018), "A Tutorial on Thompson Sampling", Foundations and Trends in Machine Learning: Vol. 11: No. 1, pp 1-96.https://web.stanford.edu/~bvr/pubs/TS_Tutorial.pdf
- ^ab J. Wyatt.Exploration and Inference in Learning from Reinforcement.Ph.D. thesis, Department of Artificial Intelligence, University of Edinburgh. March 1997.
- ^abcd P. A. Ortega and D. A. Braun. "A Minimum Relative Entropy Principle for Learning and Acting",Journal of Artificial Intelligence Research,38, pages 475–511, 2010,http://arxiv.org/abs/0810.3605
- ^ab M. J. A. Strens. "A Bayesian Framework for Reinforcement Learning",Proceedings of the Seventeenth International Conference on Machine Learning,Stanford University, California, June 29–July 2, 2000,http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.1701
- ^ab B. C. May, B. C., N. Korda, A. Lee, and D. S. Leslie. "Optimistic Bayesian sampling in contextual-bandit problems". Technical report, Statistics Group, Department of Mathematics, University of Bristol, 2011.
- ^ Chapelle, Olivier, and Lihong Li. "An empirical evaluation of Thompson sampling." Advances in neural information processing systems. 2011. http://papers.nips.cc/paper/4321-an-empirical-evaluation-of-thompson-sampling
- ^ab O.-C. Granmo. "Solving Two-Armed Bernoulli Bandit Problems Using a Bayesian Learning Automaton",International Journal of Intelligent Computing and Cybernetics,3 (2), 2010, 207-234.
- ^Ian Clarke."Proportionate A/B testing", September 22nd, 2011,http://blog.locut.us/2011/09/22/proportionate-ab-testing/
- ^Granmo, O. C.; Glimsdal, S. (2012). "Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore Game".Applied Intelligence.38(4): 479–488.doi:10.1007/s10489-012-0346-z.hdl:11250/137969.S2CID8746483.
- ^ Wu, Huasen; Liu, Xin; Srikant, R (2016),Double Thompson Sampling for Dueling Bandits,arXiv:1604.07101,Bibcode:2016arXiv160407101W
- ^Russo, Daniel J.; Van Roy, Benjamin (2014). "Learning to Optimize Via Posterior Sampling".Mathematics of Operations Research.39(4): 1221–1243.arXiv:1301.2609.doi:10.1287/moor.2014.0650.
- ^ Daniel J. Russo and Benjamin Van Roy (2013), "Eluder Dimension and the Sample Complexity of Optimistic Exploration", Advances in Neural Information Processing Systems 26, pp. 2256-2264.https://proceedings.neurips.cc/paper/2013/file/41bfd20a38bb1b0bec75acf0845530a7-Paper.pdf