On Thompson Sampling and Asymptotic Optimality∗

Total Page:16

File Type:pdf, Size:1020Kb

On Thompson Sampling and Asymptotic Optimality∗ On Thompson Sampling and Asymptotic Optimality∗ Jan Leike Tor Lattimore Laurent Orseau Marcus Hutter DeepMind Indiana University DeepMind Australian National University Future of Humanity Institute University of Oxford Abstract We discuss two different notions of optimality: asymptotic optimality and worst-case regret. We discuss some recent results on Thompson sam- Asymptotic optimality [Lattimore and Hutter, 2011] re- pling for nonparametric reinforcement learning in quires that asymptotically the agent learns to act optimally, countable classes of general stochastic environ- i.e., that the discounted value of the agent’s policy π con- ments. These environments can be non-Markovian, verges to the optimal discounted value for every environ- non-ergodic, and partially observable. We show ment from the environment class. Asymptotic optimality can that Thompson sampling learns the environment be achieved through an exploration component on top of a class in the sense that (1) asymptotically its value Bayes-optimal agent [Lattimore, 2013, Ch. 5] or through op- converges in mean to the optimal value and (2) timism [Sunehag and Hutter, 2015]. given a recoverability assumption regret is sublin- Asymptotic optimality in mean is essentially a qualitative ear. We conclude with a discussion about optimal- version of probably approximately correct (PAC) that comes ity in reinforcement learning. without a concrete convergence rate: for all " > 0 and δ > 0 the probability that our policy is "-suboptimal converges to Keywords. General reinforcement learning, Thompson zero (at an unknown rate). Eventually this probability will be sampling, asymptotic optimality, regret, discounting, recov- less than δ forever thereafter. Since our environment class can erability, AIXI. be very large and non-compact, concrete PAC/convergence rates are likely impossible. 1 Introduction Regret is how many expected rewards the agent forfeits by not following the best informed policy. Different problem In reinforcement learning (RL) an agent interacts with an un- classes have different regret rates, depending on the struc- known environment with the goal of maximizing rewards. ture and the difficulty of the problem class. Multi-armed Recently reinforcement learning has received a surge of in- bandits provide a (problem-independent) worst-case regret terest, triggered by its success in applications such as sim- p ple video games [Mnih et al., 2015]. However, theory is bound of Ω( KT ) where K is the number of arms [Bubeck lagging behind application and most theoretical analyses has and Bianchi, 2012]. Inp Markov decision processes (MDPs) been done in the bandit framework and for Markov decision the lower bound is Ω( DSAT ) where S is the number of processes (MDPs). These restricted environment classes fall states, A the number of actions, and D the diameter of the short of the full reinforcement learning problem and theoret- MDP [Auer et al., 2010]. For a countable class of environ- ical results usually assume ergocity and visiting every state ments given by state representation functions that map histo- infinitely often. Needless to say, these assumptions are not ries to MDP states, a regret of O~(T 2=3) is achievable assum- satisfied for any but the simplest applications. The goal of ing the resulting MDP is weakly communicating [Nguyen et this line of work is to lift these restrictions; we consider gen- al., 2013]. A problem class is considered learnable if there is eral reinforcement learning [Hutter, 2005; Lattimore, 2013; an algorithm that has a sublinear regret guarantee. Leike, 2016b], a top-down approach to RL with the aim to un- This paper continues a narrative that started with defini- derstand the fundamental underlying problems in their gener- tion of the Bayesian agent AIXI [Hutter, 2000] and the proof ality. Our approach to general RL is nonparametric: we only that it satisfies various optimality guarantees [Hutter, 2002]. assume that the true environment belongs to a given count- Recently it was revealed that these optimality notions are sub- able environment class. However, we leave computational jective [Leike and Hutter, 2015]: a Bayesian agent does not considerations aside for now. explore enough to lose the prior’s bias, and a particularly bad We are interested in agents that maximize rewards opti- prior can make the agent conform to any arbitrarily bad policy mally. Since the agent does not know the true environment as long as this policy yields some rewards. In particular, gen- in advance, it is not obvious what optimality should mean. eral Bayesian agents are not asymptotically optimal [Orseau, 2013]. These negative results put the Bayesian approach to ∗This is an abriged version of Leike et al. [2016a] RL into question. We remedy the situation by showing that using Bayesian techniques an agent can indeed be optimal in trates around the likely optimal actions, so sampling a pol- an objective sense. icy that takes the suboptimal action is very unlikely. This We report recent results on a strategy called Thomp- has been a known effect in the context of partial monitor- son sampling, posterior sampling, or the Bayesian control ing problems [Bartok´ et al., 2014], that commonly involve rule [Thompson, 1933]. This strategy samples an environ- information that can only be gained by taking suboptimal ac- ment ρ from the posterior, follows the ρ-optimal policy for a tions. However, in the most common theoretical frameworks while, and then repeats. We show that this policy is asymptot- for RL, multi-armed bandits and tabular MDPs, this problem ically optimal in mean. Furthermore, using a recoverability does not exist and thus has gone unnoticed so far by the the- assumption on the environment, and some (minor) assump- oretical literature. tions on the discount function, we prove that the worst-case regret is sublinear. 2 Preliminaries and Notation Thompson sampling was originally proposed by Thomp- In reinforcement learning, an agent interacts with an environ- son as a bandit algorithm [Thompson, 1933]. It is easy to ment in cycles: at time step t the agent chooses an action a implement and often achieves quite good results [Chapelle t and receives a percept e = (o ; r ) consisting of an obser- and Li, 2011]. In multi-armed bandits it attains optimal t t t vation o and a real-valued reward r ; the cycle then repeats regret [Agrawal and Goyal, 2011; Kaufmann et al., 2012]. t t for time step t + 1.A history is a sequence of actions and Thompson sampling has also been considered for MDPs: as percepts: we use æ to denote a history of length t − 1. In model-free method relying on distributions over Q-functions <t the following we assume that rewards are bounded between 0 with convergence guarantee [Dearden et al., 1998], and as a and 1. model-based algorithm without theoretical analysis [Strens, 2000]. Bayesian and frequentist regret bounds have also been In contrast to most of the literature on reinforcement learn- established [Osband et al., 2013; Osband and Van Roy, 2014; ing, we are agnostic towards the discounting strategy. Our goal is to maximize discounted rewards P1 γ r for a Gopalan and Mannor, 2015]. PAC guarantees have been es- t=1 t t discount function γ : ! γ ≥ 0 tablished for an optimistic variant of Thompson sampling for fixed N R with t and P1 γ < 1. Geometric discounting (γ = γt for some MDPs [Asmuth et al., 2009]. t=1 t t constant γ 2 (0; 1)) is the most common form of discount- For general RL, Thompson sampling was first suggested by ing, although other forms can be used [Lattimore and Hut- Ortega and Braun [2010] with resampling at every time step. ter, 2014]. The discount normalization factor is defined as The authors prove that the action probabilities of Thompson 1 Γ := P γ . sampling converge to the action probability of the optimal t k=t k An "-effective horizon H (") is a horizon that is long policy almost surely, but require a finite environment class t enough to encompass all but an " of the discount function’s and two (arguably quite strong) technical assumptions on the mass: behavior of the posterior distribution (akin to ergodicity) and H (") := minfk j Γ =Γ ≤ "g the similarity of environments in the class. Our convergence t t+k t (1) results do not require these assumptions, but we rely on an An "-effective horizon is a central quantity in online rein- (unavoidable) recoverability assumption for our regret bound. forcement learning, and has a similar function to an episode Thompson sampling can be viewed as inference over op- in the episodic setting. It is the amount of time that an agent timal policies [Ortega and Braun, 2012]. With each environ- needs to plan ahead while losing only a fraction " of the pos- ∗ ment ν 2 M we associate an optimal policy πν . At time sible value. It can be used to constrain the planning horizon step t conditional on history æ<t, the posterior belief over to a finite number of steps regardless of the discount function environment ν is w(ν j æ<t). A Bayesian agent averages used. For geometric discounting, the horizon is dlogγ "e (see over all environments by maximizing reward according to the Leike, 2016b, Tab. 4.1). P Bayesian mixture ξ(· j æ<t) = ν w(ν j æ<t)ν(· j æ<t). A policy is a function π(a j æ<t) specifying the probability In contrast, Thompson sampling averages over optimal poli- of taking action a after seeing the history æ<t. Likewise, an P ∗ cies and we get πT = ν w(ν j æ<t)πν . This way no ex- environment is a function ν(e j æ<tat) specifying the prob- plicit reward structure is needed, only a mapping from envi- ability of emitting percept e after seeing the history æ<t and ∗ ronment ν to optimal policy πν .
Recommended publications
  • Understanding Agent Incentives Using Causal Influence Diagrams
    Understanding Agent Incentives using Causal Influence Diagrams∗ Part I: Single Decision Settings Tom Everitt Pedro A. Ortega Elizabeth Barnes Shane Legg September 9, 2019 Deepmind Agents are systems that optimize an objective function in an environ- ment. Together, the goal and the environment induce secondary objectives, incentives. Modeling the agent-environment interaction using causal influ- ence diagrams, we can answer two fundamental questions about an agent’s incentives directly from the graph: (1) which nodes can the agent have an incentivize to observe, and (2) which nodes can the agent have an incentivize to control? The answers tell us which information and influence points need extra protection. For example, we may want a classifier for job applications to not use the ethnicity of the candidate, and a reinforcement learning agent not to take direct control of its reward mechanism. Different algorithms and training paradigms can lead to different causal influence diagrams, so our method can be used to identify algorithms with problematic incentives and help in designing algorithms with better incentives. Contents 1. Introduction 2 2. Background 3 3. Observation Incentives 7 4. Intervention Incentives 13 arXiv:1902.09980v6 [cs.AI] 6 Sep 2019 5. Related Work 19 6. Limitations and Future Work 22 7. Conclusions 23 References 24 A. Representing Uncertainty 29 B. Proofs 30 ∗ A number of people have been essential in preparing this paper. Ryan Carey, Eric Langlois, Michael Bowling, Tim Genewein, James Fox, Daniel Filan, Ray Jiang, Silvia Chiappa, Stuart Armstrong, Paul Christiano, Mayank Daswani, Ramana Kumar, Jonathan Uesato, Adria Garriga, Richard Ngo, Victoria Krakovna, Allan Dafoe, and Jan Leike have all contributed through thoughtful discussions and/or by reading drafts at various stages of this project.
    [Show full text]
  • Approximate Universal Artificial Intelligence And
    APPROXIMATEUNIVERSALARTIFICIAL INTELLIGENCE AND SELF-PLAY LEARNING FORGAMES Doctor of Philosophy Dissertation School of Computer Science and Engineering joel veness supervisors Kee Siong Ng Marcus Hutter Alan Blair William Uther John Lloyd January 2011 Joel Veness: Approximate Universal Artificial Intelligence and Self-play Learning for Games, Doctor of Philosophy Disserta- tion, © January 2011 When we write programs that learn, it turns out that we do and they don’t. — Alan Perlis ABSTRACT This thesis is split into two independent parts. The first is an investigation of some practical aspects of Marcus Hutter’s Uni- versal Artificial Intelligence theory [29]. The main contributions are to show how a very general agent can be built and analysed using the mathematical tools of this theory. Before the work presented in this thesis, it was an open question as to whether this theory was of any relevance to reinforcement learning practitioners. This work suggests that it is indeed relevant and worthy of future investigation. The second part of this thesis looks at self-play learning in two player, determin- istic, adversarial turn-based games. The main contribution is the introduction of a new technique for training the weights of a heuristic evaluation function from data collected by classical game tree search algorithms. This method is shown to outperform previous self-play training routines based on Temporal Difference learning when applied to the game of Chess. In particular, the main highlight was using this technique to construct a Chess program that learnt to play master level Chess by tuning a set of initially random weights from self play games.
    [Show full text]
  • Arxiv:2010.12268V1 [Cs.LG] 23 Oct 2020 Trained on a New Target Task Rapidly Loses in Its Ability to Solve Previous Source Tasks
    A Combinatorial Perspective on Transfer Learning Jianan Wang Eren Sezener David Budden Marcus Hutter Joel Veness DeepMind [email protected] Abstract Human intelligence is characterized not only by the capacity to learn complex skills, but the ability to rapidly adapt and acquire new skills within an ever-changing environment. In this work we study how the learning of modular solutions can allow for effective generalization to both unseen and potentially differently distributed data. Our main postulate is that the combination of task segmentation, modular learning and memory-based ensembling can give rise to generalization on an exponentially growing number of unseen tasks. We provide a concrete instantiation of this idea using a combination of: (1) the Forget-Me-Not Process, for task segmentation and memory based ensembling; and (2) Gated Linear Networks, which in contrast to contemporary deep learning techniques use a modular and local learning mechanism. We demonstrate that this system exhibits a number of desirable continual learning properties: robustness to catastrophic forgetting, no negative transfer and increasing levels of positive transfer as more tasks are seen. We show competitive performance against both offline and online methods on standard continual learning benchmarks. 1 Introduction Humans learn new tasks from a single temporal stream (online learning) by efficiently transferring experience of previously encountered tasks (continual learning). Contemporary machine learning algorithms struggle in both of these settings, and few attempts have been made to solve challenges at their intersection. Despite obvious computational inefficiencies, the dominant machine learning paradigm involves i.i.d. sampling of data at massive scale to reduce gradient variance and stabilize training via back-propagation.
    [Show full text]
  • On the Differences Between Human and Machine Intelligence
    On the Differences between Human and Machine Intelligence Roman V. Yampolskiy Computer Science and Engineering, University of Louisville [email protected] Abstract [Legg and Hutter, 2007a]. However, widespread implicit as- Terms Artificial General Intelligence (AGI) and Hu- sumption of equivalence between capabilities of AGI and man-Level Artificial Intelligence (HLAI) have been HLAI appears to be unjustified, as humans are not general used interchangeably to refer to the Holy Grail of Ar- intelligences. In this paper, we will prove this distinction. tificial Intelligence (AI) research, creation of a ma- Others use slightly different nomenclature with respect to chine capable of achieving goals in a wide range of general intelligence, but arrive at similar conclusions. “Lo- environments. However, widespread implicit assump- cal generalization, or “robustness”: … “adaptation to tion of equivalence between capabilities of AGI and known unknowns within a single task or well-defined set of HLAI appears to be unjustified, as humans are not gen- tasks”. … Broad generalization, or “flexibility”: “adapta- eral intelligences. In this paper, we will prove this dis- tion to unknown unknowns across a broad category of re- tinction. lated tasks”. …Extreme generalization: human-centric ex- treme generalization, which is the specific case where the 1 Introduction1 scope considered is the space of tasks and domains that fit within the human experience. We … refer to “human-cen- Imagine that tomorrow a prominent technology company tric extreme generalization” as “generality”. Importantly, as announces that they have successfully created an Artificial we deliberately define generality here by using human cog- Intelligence (AI) and offers for you to test it out.
    [Show full text]
  • Universal Artificial Intelligence Philosophical, Mathematical, and Computational Foundations of Inductive Inference and Intelligent Agents the Learn
    Universal Artificial Intelligence philosophical, mathematical, and computational foundations of inductive inference and intelligent agents the learn Marcus Hutter Australian National University Canberra, ACT, 0200, Australia http://www.hutter1.net/ ANU Universal Artificial Intelligence - 2 - Marcus Hutter Abstract: Motivation The dream of creating artificial devices that reach or outperform human intelligence is an old one, however a computationally efficient theory of true intelligence has not been found yet, despite considerable efforts in the last 50 years. Nowadays most research is more modest, focussing on solving more narrow, specific problems, associated with only some aspects of intelligence, like playing chess or natural language translation, either as a goal in itself or as a bottom-up approach. The dual, top down approach, is to find a mathematical (not computational) definition of general intelligence. Note that the AI problem remains non-trivial even when ignoring computational aspects. Universal Artificial Intelligence - 3 - Marcus Hutter Abstract: Contents In this course we will develop such an elegant mathematical parameter-free theory of an optimal reinforcement learning agent embedded in an arbitrary unknown environment that possesses essentially all aspects of rational intelligence. Most of the course is devoted to giving an introduction to the key ingredients of this theory, which are important subjects in their own right: Occam's razor; Turing machines; Kolmogorov complexity; probability theory; Solomonoff induction; Bayesian
    [Show full text]
  • QKSA: Quantum Knowledge Seeking Agent
    QKSA: Quantum Knowledge Seeking Agent motivation, core thesis and baseline framework Aritra Sarkar Department of Quantum & Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, The Netherlands 1 Introduction In this article we present the motivation and the core thesis towards the implementation of a Quantum Knowledge Seeking Agent (QKSA). QKSA is a general reinforcement learning agent that can be used to model classical and quantum dynamics. It merges ideas from universal artificial general intelligence, con- structor theory and genetic programming to build a robust and general framework for testing the capabilities of the agent in a variety of environments. It takes the artificial life (or, animat) path to artificial general intelligence where a population of intelligent agents are instantiated to explore valid ways of modeling the perceptions. The multiplicity and survivability of the agents are defined by the fitness, with respect to the explainability and predictability, of a resource-bounded computational model of the environment. This general learning approach is then employed to model the physics of an environment based on subjective ob- server states of the agents. A specific case of quantum process tomography as a general modeling principle is presented. The various background ideas and a baseline formalism is discussed in this article which sets the groundwork for the implementations of the QKSA that are currently in active development. Section 2 presents a historic overview of the motivation behind this research In Section 3 we survey some general reinforcement learning models and bio-inspired computing techniques that forms a baseline for the design of the QKSA.
    [Show full text]
  • The Fastest and Shortest Algorithm for All Well-Defined Problems
    Technical Report IDSIA-16-00, 3 March 2001 ftp://ftp.idsia.ch/pub/techrep/IDSIA-16-00.ps.gz The Fastest and Shortest Algorithm for All Well-Defined Problems1 Marcus Hutter IDSIA, Galleria 2, CH-6928 Manno-Lugano, Switzerland [email protected] http://www.idsia.ch/∼marcus Key Words Acceleration, Computational Complexity, Algorithmic Information Theory, Kol- mogorov Complexity, Blum’s Speed-up Theorem, Levin Search. Abstract An algorithm M is described that solves any well-defined problem p as quickly as the fastest algorithm computing a solution to p, save for a factor of 5 and low- order additive terms. M optimally distributes resources between the execution arXiv:cs/0206022v1 [cs.CC] 14 Jun 2002 of provably correct p-solving programs and an enumeration of all proofs, including relevant proofs of program correctness and of time bounds on program runtimes. M avoids Blum’s speed-up theorem by ignoring programs without correctness proof. M has broader applicability and can be faster than Levin’s universal search, the fastest method for inverting functions save for a large multiplicative constant. An extension of Kolmogorov complexity and two novel natural measures of function complexity are used to show that the most efficient program computing some function f is also among the shortest programs provably computing f. 1Published in the International Journal of Foundations of Computer Science, Vol. 13, No. 3, (June 2002) 431–443. Extended version of An effective Procedure for Speeding up Algorithms (cs.CC/0102018) presented at Workshops MaBiC-2001 & TAI-2001. Marcus Hutter, The Fastest and Shortest Algorithm 1 1 Introduction & Main Result Searching for fast algorithms to solve certain problems is a central and difficult task in computer science.
    [Show full text]
  • The Relativity of Induction
    The Relativity of Induction Larry Muhlstein Department of Cognitive Science University of California San Diego San Diego, CA 94703 [email protected] Abstract Lately there has been a lot of discussion about why deep learning algorithms per- form better than we would theoretically suspect. To get insight into this question, it helps to improve our understanding of how learning works. We explore the core problem of generalization and show that long-accepted Occam’s razor and parsimony principles are insufficient to ground learning. Instead, we derive and demonstrate a set of relativistic principles that yield clearer insight into the nature and dynamics of learning. We show that concepts of simplicity are fundamentally contingent, that all learning operates relative to an initial guess, and that general- ization cannot be measured or strongly inferred, but that it can be expected given enough observation. Using these principles, we reconstruct our understanding in terms of distributed learning systems whose components inherit beliefs and update them. We then apply this perspective to elucidate the nature of some real world inductive processes including deep learning. Introduction We have recently noticed a significant gap between our theoretical understanding of how machine learning works and the results of our experiments and systems. The field has experienced a boom in the scope of problems that can be tackled with machine learning methods, yet is lagging behind in deeper understanding of these tools. Deep networks often generalize successfully despite having more parameters than examples[1], and serious concerns[2] have been raised that our full suite of theoretical techniques including VC theory[3], Rademacher complexity[4], and uniform convergence[5] are unable to account for why[6].
    [Show full text]
  • Comp4620/8620: Advanced Topics in AI Foundations of Artificial Intelligence
    comp4620/8620: Advanced Topics in AI Foundations of Artificial Intelligence Marcus Hutter Australian National University Canberra, ACT, 0200, Australia http://www.hutter1.net/ ANU Foundations of Artificial Intelligence - 2 - Marcus Hutter Abstract: Motivation The dream of creating artificial devices that reach or outperform human intelligence is an old one, however a computationally efficient theory of true intelligence has not been found yet, despite considerable efforts in the last 50 years. Nowadays most research is more modest, focussing on solving more narrow, specific problems, associated with only some aspects of intelligence, like playing chess or natural language translation, either as a goal in itself or as a bottom-up approach. The dual, top down approach, is to find a mathematical (not computational) definition of general intelligence. Note that the AI problem remains non-trivial even when ignoring computational aspects. Foundations of Artificial Intelligence - 3 - Marcus Hutter Abstract: Contents In this course we will develop such an elegant mathematical parameter-free theory of an optimal reinforcement learning agent embedded in an arbitrary unknown environment that possesses essentially all aspects of rational intelligence. Most of the course is devoted to giving an introduction to the key ingredients of this theory, which are important subjects in their own right: Occam's razor; Turing machines; Kolmogorov complexity; probability theory; Solomonoff induction; Bayesian sequence prediction; minimum description length principle; agents;
    [Show full text]
  • Realab: an Embedded Perspective on Tampering
    REALab: An Embedded Perspective on Tampering Ramana Kumar∗ Jonathan Uesato∗ Richard Ngo Tom Everitt Victoria Krakovna Shane Legg Abstract This paper describes REALab, a platform for embedded agency research in reinforce- ment learning (RL). REALab is designed to model the structure of tampering problems that may arise in real-world deployments of RL. Standard Markov Decision Process (MDP) formulations of RL and simulated environments mirroring the MDP structure assume secure access to feedback (e.g., rewards). This may be unrealistic in settings where agents are embedded and can corrupt the processes producing feedback (e.g., human supervisors, or an implemented reward function). We describe an alternative Corrupt Feedback MDP formulation and the REALab environment platform, which both avoid the secure feedback assumption. We hope the design of REALab provides a useful perspective on tampering problems, and that the platform may serve as a unit test for the presence of tampering incentives in RL agent designs. 1 Introduction Tampering problems, where an AI agent interferes with whatever represents or commu- nicates its intended objective and pursues the resulting corrupted objective instead, are a staple concern in the AGI safety literature [Amodei et al., 2016, Bostrom, 2014, Everitt and Hutter, 2016, Everitt et al., 2017, Armstrong and O’Rourke, 2017, Everitt and Hutter, 2019, Armstrong et al., 2020]. Variations on the idea of tampering include wireheading, where an agent learns how to stimulate its reward mechanism directly, and the off-switch or shutdown problem, where an agent interferes with its supervisor’s ability to halt the agent’s operation. Many real-world concerns can be formulated as tampering problems, as we will show (§2.1, §4.1).
    [Show full text]
  • Universal Artificial Intelligence
    Universal Artificial Intelligence Marcus Hutter Canberra, ACT, 0200, Australia http://www.hutter1.net/ ANU RSISE NICTA Machine Learning Summer School MLSS-2010, 27 September { 6 October, Canberra Marcus Hutter - 2 - Foundations of Intelligent Agents Abstract The dream of creating arti¯cial devices that reach or outperform human intelligence is many centuries old. This tutorial presents the elegant parameter-free theory, developed in [Hut05], of an optimal reinforcement learning agent embedded in an arbitrary unknown environment that possesses essentially all aspects of rational intelligence. The theory reduces all conceptual AI problems to pure computational questions. How to perform inductive inference is closely related to the AI problem. The tutorial covers Solomono®'s theory, elaborated on in [Hut07], which solves the induction problem, at least from a philosophical and statistical perspective. Both theories are based on Occam's razor quanti¯ed by Kolmogorov complexity; Bayesian probability theory; and sequential decision theory. Marcus Hutter - 3 - Foundations of Intelligent Agents TABLE OF CONTENTS 1. PHILOSOPHICAL ISSUES 2. BAYESIAN SEQUENCE PREDICTION 3. UNIVERSAL INDUCTIVE INFERENCE 4. UNIVERSAL ARTIFICIAL INTELLIGENCE 5. APPROXIMATIONS AND APPLICATIONS 6. FUTURE DIRECTION, WRAP UP, LITERATURE Marcus Hutter - 4 - Foundations of Intelligent Agents PHILOSOPHICAL ISSUES ² Philosophical Problems ² What is (Arti¯cial) Intelligence? ² How to do Inductive Inference? ² How to Predict (Number) Sequences? ² How to make Decisions in Unknown Environments? ² Occam's Razor to the Rescue ² The Grue Emerald and Con¯rmation Paradoxes ² What this Tutorial is (Not) About Marcus Hutter - 5 - Foundations of Intelligent Agents Philosophical Issues: Abstract I start by considering the philosophical problems concerning arti¯cial intelligence and machine learning in general and induction in particular.
    [Show full text]
  • Categorizing Wireheading in Partially Embedded Agents
    Categorizing Wireheading in Partially Embedded Agents Arushi Majha1 , Sayan Sarkar2 and Davide Zagami3 1University of Cambridge 2IISER Pune 3RAISE ∗ [email protected], [email protected], [email protected] Abstract able to locate and edit that memory address to contain what- ever value corresponds to the highest reward. Chances that Embedded agents are not explicitly separated from such behavior will be incentivized increase as we develop their environment, lacking clear I/O channels. Such ever more intelligent agents1. agents can reason about and modify their internal The discussion of AI systems has thus far been dominated parts, which they are incentivized to shortcut or by dualistic models where the agent is clearly separated from wirehead in order to achieve the maximal reward. its environment, has well-defined input/output channels, and In this paper, we provide a taxonomy of ways by does not have any control over the design of its internal parts. which wireheading can occur, followed by a defini- Recent work on these problems [Demski and Garrabrant, tion of wirehead-vulnerable agents. Starting from 2019; Everitt and Hutter, 2018; Everitt et al., 2019] provides the fully dualistic universal agent AIXI, we intro- a taxonomy of ways in which embedded agents violate essen- duce a spectrum of partially embedded agents and tial assumptions that are usually granted in dualistic formula- identify wireheading opportunities that such agents tions, such as with the universal agent AIXI [Hutter, 2004]. can exploit, experimentally demonstrating the re- Wireheading can be considered one particular class of mis- sults with the GRL simulation platform AIXIjs. We alignment [Everitt and Hutter, 2018], a divergence between contextualize wireheading in the broader class of the goals of the agent and the goals of its designers.
    [Show full text]