Loss Bounds and Time Complexity for Speed Priors

Total Page:16

File Type:pdf, Size:1020Kb

Loss Bounds and Time Complexity for Speed Priors Loss Bounds and Time Complexity for Speed Priors Daniel Filan Jan Leike Marcus Hutter Research School of Computer Science, Australian National University Abstract computable (Solomonoff, 1964, 1978). The Solomonoff prior M assigns to a string x the probability that a This paper establishes for the first time the universal Turing machine prints something starting predictive performance of speed priors and with x when fed with fair coin flips. Equivalently, the their computational complexity. A speed prior distribution M can be seen as a Bayesian mixture that is essentially a probability distribution that weighs each distribution according to their Kolmogorov puts low probability on strings that are not ef- complexity (Wood et al., 2013), assigning higher a ficiently computable. We propose a variant to priori probability to simpler hypotheses (Hutter, 2007). the original speed prior (Schmidhuber, 2002), However, M is incomputable (Leike and Hutter, 2015), and show that our prior can predict sequences which has thus far limited its application. drawn from probability measures that are es- Schmidhuber has proposed a computable alternative timable in polynomial time. Our speed prior to M which discounts strings that are not efficiently is computable in doubly-exponential time, but computable (Schmidhuber, 2002). This distribution not in polynomial time. On a polynomial time is called the speed prior because asymptotically only computable sequence our speed prior is com- the computationally fastest distributions that explain putable in exponential time. We show better the data contribute to the mixture. However, no loss upper complexity bounds for Schmidhuber’s bounds for Schmidhuber’s prior, which we write as speed prior under the same conditions, and SFast, are known except in the case where the data are that it predicts deterministic sequences that drawn from a prior like Schmidhuber’s. are computable in polynomial time; however, we also show that it is not computable in poly- We introduce a prior SKt that is related to both SFast nomial time, and the question of its predictive and M, and establish in Section 3 that it is also a properties for stochastic sequences remains speed prior in Schmidhuber’s sense. Our first main open. contribution is a bound on the loss incurred by a SKt- based predictor when predicting strings drawn from a distribution that is computable in polynomial time. 1 Introduction This is proved in Section 4. The bounds we get are only a logarithmic factor worse than the bounds for We consider the general problem of sequence prediction, the Solomonoff predictor. In particular, if the measure where a sequence of symbols x1, x2, . , xt 1 is drawn is deterministic and the loss function penalises errors, from an unknown computable distribution−µ, and the SKt-based prediction will only make a logarithmic num- task is to predict the next symbol x . If µ belongs t ber of errors. Therefore, SKt is able to effectively learn to some known countable class of distributions, then the generating distribution µ. Our second main contri- a Bayesian mixture over the class leads to good loss bution is a proof that the same bound holds for the loss bounds: the expected loss is at most L + O(√L) where incurred by a SFast-based predictor when computing a L is the loss of the informed predictor that knows string deterministically generated in polynomial time, µ (Hutter, 2005, Thm. 3.48). These bounds are known shown in the same section. to be tight. In Section 5 we discuss the time complexity of SKt and Solomonoff’s theory of inductive inference handles the SFast. We show that SFast is computable in exponential most general case where all we know about µ is that it is time while SKt is computable in doubly-exponential time, but not in polynomial time, limiting its practical Appearing in Proceedings of the 19th International Con- ference on Artificial Intelligence and Statistics (AISTATS) applicability. However, we also show that if we are 2016, Cadiz, Spain. JMLR: W&CP volume 41. Copyright predicting a sequence that is computable in polynomial 2016 by the authors. time, it only takes polynomial time to compute SFast 1394 Daniel Filan, Jan Leike, Marcus Hutter and exponential time to compute SKt. 2.2 SFast and M Although the results of this paper are theoretical To define SFast, we first need to define the fast algo- and the algorithms impractical-seeming, related ideas rithm (called search by Li and Vit´anyi (2008), Ch. from the field of algorithmic information theory have 7.5) after which it is named. This algorithm performs been approximated and put into practice. Exam- i p phase i for each i N, whereby 2 −| | instructions ples include the Universal Similarity Metric’s use in of all programs satisfying∈ p i are executed as they clustering (Cilibrasi and Vitanyi, 2005), Solomonoff- would be on U, and the outputs| | ≤ are printed sequen- based reinforcement learning (Veness et al., 2011), and tially, separated by blanks. If string x is computed by the Levin search-inspired Optimal Ordered Problem program p in phase i, then we write p i x. Then, Solver (Schmidhuber, 2004). However, using the the- S is defined as → ory to devise practical applications is a non-trivial task Fast that we leave for future work. ∞ i p SFast(x) := 2− 2−| | (1) i=1 p x X X→i 2 Preliminaries This algorithm is inspired by the Kt complexity of a string, defined as 2.1 Setup and notation Kt(x) = min p + log t(U, p, x) p {| | } Throughout this paper, we use monotone Turing ma- where t(U, p, x) is the time taken for program p to chines with a binary alphabet B = 0, 1 , although compute x on the UTM U, and if program p never all results generalise to arbitrary finite{ alphabets.} A computes x, we set t(U, p, x) := (Li and Vit´anyi, monotone machine is one with a unidirectional read- 2008, Def. 7.5.1). If we define the ∞Kt-cost of a compu- only input tape where the head can only move one way, tation of a string x by program p as the minimand of a unidirectional write-only output tape where the head Kt, that is, can only move one way, and some bidirectional work Kt-cost(p, x) := p + log t(p, x) tapes. We say that a monotone machine T computes | | string x given program p if the machine prints x after then we can see that program p computes string x in phase i of fast iff Kt-cost(p, x) i. As such, S reading all of p but no more, and write p T x (Li and Fast gives low probability to strings of high≤ Kt complexity. Vit´anyi, 2008, Def. 4.5.2). Some of these machines−→ are universal Turing machines, or ‘UTM’s. A UTM can Similarly to the above, the monotone Kolmogorov com- simulate all other machines, so that the output of U plexity of x is defined as 1 given input I(T )p (where I(T ) is a prefix-free coding Km(x) = min p p x of a Turing machine T ) is the same as the output of p {| | | → } T given input p. Furthermore, we may assume this If we define the minimand of Km as simulation occurs with only polynomial time overhead. p if p x In this paper, we fix a ‘reference’ UTM U, and when- Km-cost(p, x) := | | → otherwise ever a function f(T,... ) takes an argument T that is (∞ p a Turing machine, we will often write f(... ), where we then the Solomonoff prior M(x) = p x 2−| | can be set T to be the reference UTM. Km-cost(p,x) → written as p x 2− . M and SFast are both → P Our notation is fairly standard, with a few exceptions. semimeasures, but not measures: U P If p x, then we simply write p x. We write Definition 1. A semimeasure is a function ν : B∗ −→ → → f(n) × g(n) if f(n) = O(g(n)), and f(n) =× g(n) if [0, ) such that ν() 1 and ν(x) ν(x0) + ν(x1) for ≤ ∞ ≤ ≥ × × all x B∗. If ν satisfies these with equality, we call ν f(n) g(n) and g(n) f(n). Also, if x is some string, ∈ we denote≤ the length≤ of x by x . We write the set of a measure. | | finite binary strings as B∗, the set of infinite binary th Semimeasures can be used for prediction: sequences as B∞, an element of B∞ as x1: , the n ∞ symbol of a string x or x1: as xn, and the first n Definition 2. If ν is a semimeasure, the ν-probability symbols of any string x or ∞x as x .#A is the 1: 1:n of xt given x<t is ν(xt x<t) := ν(x1:t)/ν(x<t). cardinality of set A. Finally, we∞ write x y if string x | v is a prefix of string y, and x @ y if x is a proper prefix of y. 3 Speed priors 1A coding such that for no two different machines T and By analogy to M, we can define a variant of the T 0 is I(T ) a prefix of I(T 0). Solomonoff prior that penalises strings of high Kt com- 1395 Daniel Filan, Jan Leike, Marcus Hutter plexity more directly than SFast does: Proposition 5. p 1 Kt-cost(p,x) 2−| | S (x) := 2− = (2) SKt(x) Kt t(p, x) ≤ t p x p x x t X→ X→ X∈C SKt is a semimeasure, but is not a measure.
Recommended publications
  • Understanding Agent Incentives Using Causal Influence Diagrams
    Understanding Agent Incentives using Causal Influence Diagrams∗ Part I: Single Decision Settings Tom Everitt Pedro A. Ortega Elizabeth Barnes Shane Legg September 9, 2019 Deepmind Agents are systems that optimize an objective function in an environ- ment. Together, the goal and the environment induce secondary objectives, incentives. Modeling the agent-environment interaction using causal influ- ence diagrams, we can answer two fundamental questions about an agent’s incentives directly from the graph: (1) which nodes can the agent have an incentivize to observe, and (2) which nodes can the agent have an incentivize to control? The answers tell us which information and influence points need extra protection. For example, we may want a classifier for job applications to not use the ethnicity of the candidate, and a reinforcement learning agent not to take direct control of its reward mechanism. Different algorithms and training paradigms can lead to different causal influence diagrams, so our method can be used to identify algorithms with problematic incentives and help in designing algorithms with better incentives. Contents 1. Introduction 2 2. Background 3 3. Observation Incentives 7 4. Intervention Incentives 13 arXiv:1902.09980v6 [cs.AI] 6 Sep 2019 5. Related Work 19 6. Limitations and Future Work 22 7. Conclusions 23 References 24 A. Representing Uncertainty 29 B. Proofs 30 ∗ A number of people have been essential in preparing this paper. Ryan Carey, Eric Langlois, Michael Bowling, Tim Genewein, James Fox, Daniel Filan, Ray Jiang, Silvia Chiappa, Stuart Armstrong, Paul Christiano, Mayank Daswani, Ramana Kumar, Jonathan Uesato, Adria Garriga, Richard Ngo, Victoria Krakovna, Allan Dafoe, and Jan Leike have all contributed through thoughtful discussions and/or by reading drafts at various stages of this project.
    [Show full text]
  • Approximate Universal Artificial Intelligence And
    APPROXIMATEUNIVERSALARTIFICIAL INTELLIGENCE AND SELF-PLAY LEARNING FORGAMES Doctor of Philosophy Dissertation School of Computer Science and Engineering joel veness supervisors Kee Siong Ng Marcus Hutter Alan Blair William Uther John Lloyd January 2011 Joel Veness: Approximate Universal Artificial Intelligence and Self-play Learning for Games, Doctor of Philosophy Disserta- tion, © January 2011 When we write programs that learn, it turns out that we do and they don’t. — Alan Perlis ABSTRACT This thesis is split into two independent parts. The first is an investigation of some practical aspects of Marcus Hutter’s Uni- versal Artificial Intelligence theory [29]. The main contributions are to show how a very general agent can be built and analysed using the mathematical tools of this theory. Before the work presented in this thesis, it was an open question as to whether this theory was of any relevance to reinforcement learning practitioners. This work suggests that it is indeed relevant and worthy of future investigation. The second part of this thesis looks at self-play learning in two player, determin- istic, adversarial turn-based games. The main contribution is the introduction of a new technique for training the weights of a heuristic evaluation function from data collected by classical game tree search algorithms. This method is shown to outperform previous self-play training routines based on Temporal Difference learning when applied to the game of Chess. In particular, the main highlight was using this technique to construct a Chess program that learnt to play master level Chess by tuning a set of initially random weights from self play games.
    [Show full text]
  • Arxiv:2010.12268V1 [Cs.LG] 23 Oct 2020 Trained on a New Target Task Rapidly Loses in Its Ability to Solve Previous Source Tasks
    A Combinatorial Perspective on Transfer Learning Jianan Wang Eren Sezener David Budden Marcus Hutter Joel Veness DeepMind [email protected] Abstract Human intelligence is characterized not only by the capacity to learn complex skills, but the ability to rapidly adapt and acquire new skills within an ever-changing environment. In this work we study how the learning of modular solutions can allow for effective generalization to both unseen and potentially differently distributed data. Our main postulate is that the combination of task segmentation, modular learning and memory-based ensembling can give rise to generalization on an exponentially growing number of unseen tasks. We provide a concrete instantiation of this idea using a combination of: (1) the Forget-Me-Not Process, for task segmentation and memory based ensembling; and (2) Gated Linear Networks, which in contrast to contemporary deep learning techniques use a modular and local learning mechanism. We demonstrate that this system exhibits a number of desirable continual learning properties: robustness to catastrophic forgetting, no negative transfer and increasing levels of positive transfer as more tasks are seen. We show competitive performance against both offline and online methods on standard continual learning benchmarks. 1 Introduction Humans learn new tasks from a single temporal stream (online learning) by efficiently transferring experience of previously encountered tasks (continual learning). Contemporary machine learning algorithms struggle in both of these settings, and few attempts have been made to solve challenges at their intersection. Despite obvious computational inefficiencies, the dominant machine learning paradigm involves i.i.d. sampling of data at massive scale to reduce gradient variance and stabilize training via back-propagation.
    [Show full text]
  • On the Differences Between Human and Machine Intelligence
    On the Differences between Human and Machine Intelligence Roman V. Yampolskiy Computer Science and Engineering, University of Louisville [email protected] Abstract [Legg and Hutter, 2007a]. However, widespread implicit as- Terms Artificial General Intelligence (AGI) and Hu- sumption of equivalence between capabilities of AGI and man-Level Artificial Intelligence (HLAI) have been HLAI appears to be unjustified, as humans are not general used interchangeably to refer to the Holy Grail of Ar- intelligences. In this paper, we will prove this distinction. tificial Intelligence (AI) research, creation of a ma- Others use slightly different nomenclature with respect to chine capable of achieving goals in a wide range of general intelligence, but arrive at similar conclusions. “Lo- environments. However, widespread implicit assump- cal generalization, or “robustness”: … “adaptation to tion of equivalence between capabilities of AGI and known unknowns within a single task or well-defined set of HLAI appears to be unjustified, as humans are not gen- tasks”. … Broad generalization, or “flexibility”: “adapta- eral intelligences. In this paper, we will prove this dis- tion to unknown unknowns across a broad category of re- tinction. lated tasks”. …Extreme generalization: human-centric ex- treme generalization, which is the specific case where the 1 Introduction1 scope considered is the space of tasks and domains that fit within the human experience. We … refer to “human-cen- Imagine that tomorrow a prominent technology company tric extreme generalization” as “generality”. Importantly, as announces that they have successfully created an Artificial we deliberately define generality here by using human cog- Intelligence (AI) and offers for you to test it out.
    [Show full text]
  • Universal Artificial Intelligence Philosophical, Mathematical, and Computational Foundations of Inductive Inference and Intelligent Agents the Learn
    Universal Artificial Intelligence philosophical, mathematical, and computational foundations of inductive inference and intelligent agents the learn Marcus Hutter Australian National University Canberra, ACT, 0200, Australia http://www.hutter1.net/ ANU Universal Artificial Intelligence - 2 - Marcus Hutter Abstract: Motivation The dream of creating artificial devices that reach or outperform human intelligence is an old one, however a computationally efficient theory of true intelligence has not been found yet, despite considerable efforts in the last 50 years. Nowadays most research is more modest, focussing on solving more narrow, specific problems, associated with only some aspects of intelligence, like playing chess or natural language translation, either as a goal in itself or as a bottom-up approach. The dual, top down approach, is to find a mathematical (not computational) definition of general intelligence. Note that the AI problem remains non-trivial even when ignoring computational aspects. Universal Artificial Intelligence - 3 - Marcus Hutter Abstract: Contents In this course we will develop such an elegant mathematical parameter-free theory of an optimal reinforcement learning agent embedded in an arbitrary unknown environment that possesses essentially all aspects of rational intelligence. Most of the course is devoted to giving an introduction to the key ingredients of this theory, which are important subjects in their own right: Occam's razor; Turing machines; Kolmogorov complexity; probability theory; Solomonoff induction; Bayesian
    [Show full text]
  • QKSA: Quantum Knowledge Seeking Agent
    QKSA: Quantum Knowledge Seeking Agent motivation, core thesis and baseline framework Aritra Sarkar Department of Quantum & Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, The Netherlands 1 Introduction In this article we present the motivation and the core thesis towards the implementation of a Quantum Knowledge Seeking Agent (QKSA). QKSA is a general reinforcement learning agent that can be used to model classical and quantum dynamics. It merges ideas from universal artificial general intelligence, con- structor theory and genetic programming to build a robust and general framework for testing the capabilities of the agent in a variety of environments. It takes the artificial life (or, animat) path to artificial general intelligence where a population of intelligent agents are instantiated to explore valid ways of modeling the perceptions. The multiplicity and survivability of the agents are defined by the fitness, with respect to the explainability and predictability, of a resource-bounded computational model of the environment. This general learning approach is then employed to model the physics of an environment based on subjective ob- server states of the agents. A specific case of quantum process tomography as a general modeling principle is presented. The various background ideas and a baseline formalism is discussed in this article which sets the groundwork for the implementations of the QKSA that are currently in active development. Section 2 presents a historic overview of the motivation behind this research In Section 3 we survey some general reinforcement learning models and bio-inspired computing techniques that forms a baseline for the design of the QKSA.
    [Show full text]
  • The Fastest and Shortest Algorithm for All Well-Defined Problems
    Technical Report IDSIA-16-00, 3 March 2001 ftp://ftp.idsia.ch/pub/techrep/IDSIA-16-00.ps.gz The Fastest and Shortest Algorithm for All Well-Defined Problems1 Marcus Hutter IDSIA, Galleria 2, CH-6928 Manno-Lugano, Switzerland [email protected] http://www.idsia.ch/∼marcus Key Words Acceleration, Computational Complexity, Algorithmic Information Theory, Kol- mogorov Complexity, Blum’s Speed-up Theorem, Levin Search. Abstract An algorithm M is described that solves any well-defined problem p as quickly as the fastest algorithm computing a solution to p, save for a factor of 5 and low- order additive terms. M optimally distributes resources between the execution arXiv:cs/0206022v1 [cs.CC] 14 Jun 2002 of provably correct p-solving programs and an enumeration of all proofs, including relevant proofs of program correctness and of time bounds on program runtimes. M avoids Blum’s speed-up theorem by ignoring programs without correctness proof. M has broader applicability and can be faster than Levin’s universal search, the fastest method for inverting functions save for a large multiplicative constant. An extension of Kolmogorov complexity and two novel natural measures of function complexity are used to show that the most efficient program computing some function f is also among the shortest programs provably computing f. 1Published in the International Journal of Foundations of Computer Science, Vol. 13, No. 3, (June 2002) 431–443. Extended version of An effective Procedure for Speeding up Algorithms (cs.CC/0102018) presented at Workshops MaBiC-2001 & TAI-2001. Marcus Hutter, The Fastest and Shortest Algorithm 1 1 Introduction & Main Result Searching for fast algorithms to solve certain problems is a central and difficult task in computer science.
    [Show full text]
  • The Relativity of Induction
    The Relativity of Induction Larry Muhlstein Department of Cognitive Science University of California San Diego San Diego, CA 94703 [email protected] Abstract Lately there has been a lot of discussion about why deep learning algorithms per- form better than we would theoretically suspect. To get insight into this question, it helps to improve our understanding of how learning works. We explore the core problem of generalization and show that long-accepted Occam’s razor and parsimony principles are insufficient to ground learning. Instead, we derive and demonstrate a set of relativistic principles that yield clearer insight into the nature and dynamics of learning. We show that concepts of simplicity are fundamentally contingent, that all learning operates relative to an initial guess, and that general- ization cannot be measured or strongly inferred, but that it can be expected given enough observation. Using these principles, we reconstruct our understanding in terms of distributed learning systems whose components inherit beliefs and update them. We then apply this perspective to elucidate the nature of some real world inductive processes including deep learning. Introduction We have recently noticed a significant gap between our theoretical understanding of how machine learning works and the results of our experiments and systems. The field has experienced a boom in the scope of problems that can be tackled with machine learning methods, yet is lagging behind in deeper understanding of these tools. Deep networks often generalize successfully despite having more parameters than examples[1], and serious concerns[2] have been raised that our full suite of theoretical techniques including VC theory[3], Rademacher complexity[4], and uniform convergence[5] are unable to account for why[6].
    [Show full text]
  • Comp4620/8620: Advanced Topics in AI Foundations of Artificial Intelligence
    comp4620/8620: Advanced Topics in AI Foundations of Artificial Intelligence Marcus Hutter Australian National University Canberra, ACT, 0200, Australia http://www.hutter1.net/ ANU Foundations of Artificial Intelligence - 2 - Marcus Hutter Abstract: Motivation The dream of creating artificial devices that reach or outperform human intelligence is an old one, however a computationally efficient theory of true intelligence has not been found yet, despite considerable efforts in the last 50 years. Nowadays most research is more modest, focussing on solving more narrow, specific problems, associated with only some aspects of intelligence, like playing chess or natural language translation, either as a goal in itself or as a bottom-up approach. The dual, top down approach, is to find a mathematical (not computational) definition of general intelligence. Note that the AI problem remains non-trivial even when ignoring computational aspects. Foundations of Artificial Intelligence - 3 - Marcus Hutter Abstract: Contents In this course we will develop such an elegant mathematical parameter-free theory of an optimal reinforcement learning agent embedded in an arbitrary unknown environment that possesses essentially all aspects of rational intelligence. Most of the course is devoted to giving an introduction to the key ingredients of this theory, which are important subjects in their own right: Occam's razor; Turing machines; Kolmogorov complexity; probability theory; Solomonoff induction; Bayesian sequence prediction; minimum description length principle; agents;
    [Show full text]
  • Realab: an Embedded Perspective on Tampering
    REALab: An Embedded Perspective on Tampering Ramana Kumar∗ Jonathan Uesato∗ Richard Ngo Tom Everitt Victoria Krakovna Shane Legg Abstract This paper describes REALab, a platform for embedded agency research in reinforce- ment learning (RL). REALab is designed to model the structure of tampering problems that may arise in real-world deployments of RL. Standard Markov Decision Process (MDP) formulations of RL and simulated environments mirroring the MDP structure assume secure access to feedback (e.g., rewards). This may be unrealistic in settings where agents are embedded and can corrupt the processes producing feedback (e.g., human supervisors, or an implemented reward function). We describe an alternative Corrupt Feedback MDP formulation and the REALab environment platform, which both avoid the secure feedback assumption. We hope the design of REALab provides a useful perspective on tampering problems, and that the platform may serve as a unit test for the presence of tampering incentives in RL agent designs. 1 Introduction Tampering problems, where an AI agent interferes with whatever represents or commu- nicates its intended objective and pursues the resulting corrupted objective instead, are a staple concern in the AGI safety literature [Amodei et al., 2016, Bostrom, 2014, Everitt and Hutter, 2016, Everitt et al., 2017, Armstrong and O’Rourke, 2017, Everitt and Hutter, 2019, Armstrong et al., 2020]. Variations on the idea of tampering include wireheading, where an agent learns how to stimulate its reward mechanism directly, and the off-switch or shutdown problem, where an agent interferes with its supervisor’s ability to halt the agent’s operation. Many real-world concerns can be formulated as tampering problems, as we will show (§2.1, §4.1).
    [Show full text]
  • Universal Artificial Intelligence
    Universal Artificial Intelligence Marcus Hutter Canberra, ACT, 0200, Australia http://www.hutter1.net/ ANU RSISE NICTA Machine Learning Summer School MLSS-2010, 27 September { 6 October, Canberra Marcus Hutter - 2 - Foundations of Intelligent Agents Abstract The dream of creating arti¯cial devices that reach or outperform human intelligence is many centuries old. This tutorial presents the elegant parameter-free theory, developed in [Hut05], of an optimal reinforcement learning agent embedded in an arbitrary unknown environment that possesses essentially all aspects of rational intelligence. The theory reduces all conceptual AI problems to pure computational questions. How to perform inductive inference is closely related to the AI problem. The tutorial covers Solomono®'s theory, elaborated on in [Hut07], which solves the induction problem, at least from a philosophical and statistical perspective. Both theories are based on Occam's razor quanti¯ed by Kolmogorov complexity; Bayesian probability theory; and sequential decision theory. Marcus Hutter - 3 - Foundations of Intelligent Agents TABLE OF CONTENTS 1. PHILOSOPHICAL ISSUES 2. BAYESIAN SEQUENCE PREDICTION 3. UNIVERSAL INDUCTIVE INFERENCE 4. UNIVERSAL ARTIFICIAL INTELLIGENCE 5. APPROXIMATIONS AND APPLICATIONS 6. FUTURE DIRECTION, WRAP UP, LITERATURE Marcus Hutter - 4 - Foundations of Intelligent Agents PHILOSOPHICAL ISSUES ² Philosophical Problems ² What is (Arti¯cial) Intelligence? ² How to do Inductive Inference? ² How to Predict (Number) Sequences? ² How to make Decisions in Unknown Environments? ² Occam's Razor to the Rescue ² The Grue Emerald and Con¯rmation Paradoxes ² What this Tutorial is (Not) About Marcus Hutter - 5 - Foundations of Intelligent Agents Philosophical Issues: Abstract I start by considering the philosophical problems concerning arti¯cial intelligence and machine learning in general and induction in particular.
    [Show full text]
  • Categorizing Wireheading in Partially Embedded Agents
    Categorizing Wireheading in Partially Embedded Agents Arushi Majha1 , Sayan Sarkar2 and Davide Zagami3 1University of Cambridge 2IISER Pune 3RAISE ∗ [email protected], [email protected], [email protected] Abstract able to locate and edit that memory address to contain what- ever value corresponds to the highest reward. Chances that Embedded agents are not explicitly separated from such behavior will be incentivized increase as we develop their environment, lacking clear I/O channels. Such ever more intelligent agents1. agents can reason about and modify their internal The discussion of AI systems has thus far been dominated parts, which they are incentivized to shortcut or by dualistic models where the agent is clearly separated from wirehead in order to achieve the maximal reward. its environment, has well-defined input/output channels, and In this paper, we provide a taxonomy of ways by does not have any control over the design of its internal parts. which wireheading can occur, followed by a defini- Recent work on these problems [Demski and Garrabrant, tion of wirehead-vulnerable agents. Starting from 2019; Everitt and Hutter, 2018; Everitt et al., 2019] provides the fully dualistic universal agent AIXI, we intro- a taxonomy of ways in which embedded agents violate essen- duce a spectrum of partially embedded agents and tial assumptions that are usually granted in dualistic formula- identify wireheading opportunities that such agents tions, such as with the universal agent AIXI [Hutter, 2004]. can exploit, experimentally demonstrating the re- Wireheading can be considered one particular class of mis- sults with the GRL simulation platform AIXIjs. We alignment [Everitt and Hutter, 2018], a divergence between contextualize wireheading in the broader class of the goals of the agent and the goals of its designers.
    [Show full text]