Arxiv:1903.01021V2 [Cs.LG] 27 May 2019 Made That the Problem Be Dropped Over Germany, Is a Separate Problem

Total Page:16

File Type:pdf, Size:1020Kb

Arxiv:1903.01021V2 [Cs.LG] 27 May 2019 Made That the Problem Be Dropped Over Germany, Is a Separate Problem A Strongly Asymptotically Optimal Agent in General Environments Michael K. Cohen1∗ , Elliot Catt1 and Marcus Hutter1 1Australian National University fmichael.cohen, elliot.carpentercatt, [email protected] Abstract Our work is within the Reinforcement Learning (RL) paradigm: an agent selects an action, and the environment Reinforcement Learning agents are expected to responds with an observation and a reward. The interaction eventually perform well. Typically, this takes the may end, or it may continue forever. Each interaction cycle form of a guarantee about the asymptotic behav- is called a timestep. The agent has a discount function that ior of an algorithm given some assumptions about weights its relative concern for the reward it achieves at vari- the environment. We present an algorithm for a ous future timesteps. The agent’s job is to select actions that policy whose value approaches the optimal value maximize the total expected discounted reward it achieves in with probability 1 in all computable probabilistic its lifetime. The “value” of an agent’s policy at a certain point environments, provided the agent has a bounded in time is the expected total discounted reward it achieves af- horizon. This is known as strong asymptotic op- ter that time if it follows that policy. One formal specification timality, and it was previously unknown whether it of the exploration-exploitation problem is: what policy can an was possible for a policy to be strongly asymptot- agent follow so that the policy’s value approaches the value ically optimal in the class of all computable prob- of the optimal informed policy with probability 1, even when abilistic environments. Our agent, Inquisitive Re- the agent doesn’t start out knowing the true dynamics of its inforcement Learner (Inq), is more likely to ex- environment? plore the more it expects an exploratory action to Most work in RL makes strong assumptions about the en- reduce its uncertainty about which environment it vironment—that the environment is Markov, for instance. is in, hence the term inquisitive. Exploring inquis- Impressive recent development in the field of reinforcement itively is a strategy that can be applied generally; learning often makes use of the Markov assumption, includ- for more manageable environment classes, inquis- ing Deep Q Networks [Mnih et al., 2015], A3C [Mnih et al., itiveness is tractable. We conducted experiments 2016], Rainbow [Hessel et al., 2018], and AlphaZero [Silver in “grid-worlds” to compare the Inquisitive Rein- et al., 2017]. Another example of making strong assumptions forcement Learner to other weakly asymptotically in RL comes from some model-based algorithms that implic- optimal agents. itly assume that the environment is representable by, for ex- ample, a fixed-size neural network, or whatever construct is 1 Introduction used to model the environment. We do not make any such “Efforts to solve [an instance of the exploration- assumptions. exploitation problem] so sapped the energies and Many recent developments in RL are largely about minds of Allied analysts that the suggestion was tractably learning to exploit; how to explore intelligently arXiv:1903.01021v2 [cs.LG] 27 May 2019 made that the problem be dropped over Germany, is a separate problem. We address the latter problem. as the ultimate instrument of intellectual sabotage.” Our approach, inquisitiveness, is based on Orseau et al.’s –Peter Whittle [Whittle, 1979] [2013] Knowledge Seeking Agent for Stochastic Environ- ments, which selects the actions that best inform the agent The Allied analysts were considering the simplest possible about what environment it is in. Our Inquisitive Reinforce- problem in which there is a trade-off to be made between ment Learner (Inq) explores like a knowledge seeking agent, exploiting, taking the apparently best option, and exploring, and is more likely to explore when there is apparently (ac- choosing a different option to learn more. We tackle what cording to its current beliefs) more to be learned. Some- we consider the most difficult instance of the exploration- times exploring well requires “expeditions,” or many consec- exploitation trade-off problem: when the environment could utive exploratory actions. Inq entertains expeditions of all be any computable probability distribution, not just a multi- lengths, although it follows the longer ones less often, and it armed bandit, how can one achieve optimal performance in doesn’t resolutely commit in advance to seeing the expedition the limit? through. ∗Contact Author This is a very human approach to information acquisition. When we spot an opportunity to learn something about our and definitions for quick reference. Appendix B contains the natural environment, we feel inquisitive. We get distracted. proofs of the lemmas. We are inclined to check it out, even if we don’t see directly in advance how this information might help us better achieve 2 Notation our goals. Moreover, if we can tell that the opportunity to We follow the notation of Orseau, et al. [2013]. The rein- learn something requires a longer term project, we may find forcement learning setup is as follows: A is a finite set of ourselves less inquisitive. actions available to the agent; O is a finite set of observa- For the class of computable environments (stochastic envi- tions it might observe, and R = [0; 1] \ Q is the set of ronments that follow a computable probability distribution), possible rewards. The set of all possible interactions in a it was previously unknown whether any policy could achieve timestep is H := A × O × R. At every timestep, one el- strong asymptotic optimality (convergence of the value to op- ement from this set occurs. A reinforcement learner’s policy [ ] timality with probability 1). Lattimore et al. 2011 showed π is a stochastic function which outputs an action given an in- that no deterministic policy could achieve this. The key ad- ∗ ∗ S1 i teraction history, denoted by π : H A.(X := i=0 X vantage that stochastic policies have is that they can let the represents all finite strings from an alphabet X ). An envi- exploration probability go to 0 while still exploring infinitely ronment is a stochastic function which outputs an observa- often. (For example, an agent that explores with probability tion and reward given an interaction history and an action: 1=t at time t still explores infinitely often). ∗ ν : H × A O × R. For a stochastic function f : X!Y, There is a weaker notion of optimality–“weak asymptotic f(yjx) denotes the probability that f outputs y 2 Y when optimality”–for which positive results already exist; this con- x 2 X is input. dition requires that the average value over the agent’s life- A policy and an environment induce a probability measure time approach optimality. Lattimore et al. [2011] identified a over H1, the set of all possible infinite histories: for h 2 H∗, weakly asymptotically optimal agent for deterministic com- π Pν (h) denotes the probability that an infinite history begins putable environments; the agent maintains a list of environ- with h when actions are sampled from the policy π, and ob- ments consistent with its observations, exploiting as if it is servations and rewards are sampled from the environment ν. in the first such one, and exploring in bursts. A recent algo- π Formally, we define this inductively: Pν () 7! 1, where is rithm for a Thompson Sampling Bayesian agent was shown, the empty history, and for h 2 H∗, a 2 A, o 2 O, r 2 R, with an elegant proof, to be weakly asymptotically optimal in π π we define Pν (haor) 7! Pν (h)π(ajh)ν(orjha). In an infinite all computable environments, but not strongly asymptotically history h 2 H1, a , o , and r refer to the tth action, ob- optimal [Leike et al., 2016]. 1:1 t t t servation and reward, and ht refers to the tth timestep: atotrt. Most work in RL regards (Partially Observable) Markov h<t refers to the first t − 1 timesteps, and ht:k refers to the Decision Processes (PO)MDPs. However, environments string of timesteps t through k (inclusive). Strings of actions, that enter completely novel states infinitely often render observations, and rewards are notated similarly. (PO)MDP algorithms helpless. For example, an RL agent A Bayesian agent deems a class of environments a priori acting as a chatbot, optimizing a function, or proving mathe- feasible. Its “beliefs” take the form of a probability distribu- matical theorems would struggle to model the environment as tion over which environment is the true one. We call this the an MDP, and would likely require an exploration mechanism agent’s belief distribution. In our formulation, Inq considers like ours. In the chatbot case, for instance, as a conversation any computable environment feasible, and starts with a prior with a person progresses, the person never returns to the same belief distribution based on the environments’ Kolmogorov state. complexities: that is, the length of the shortest program that If we formally compare Inq to existing algorithms in computes the environment on some reference machine. How- MDPs, we find that many achieve asymptotic optimality. ever, all our results hold as long as the true environment is Epsilon-greedy, upper confidence bound, and Thompson contained in the class of environments that are considered sampling exploration strategies suffice in MDPs. Our primary feasible, and as long as the prior belief distribution assigns motivation is for the sorts of environments described above. nonzero probability to each environment in the class. We To discriminate between exploratory approaches in ergodic take M to be the class of all computable environments, and MDPs, one can formally bound regret, and we would like to w(ν) := 2−K(ν)(1+")=N to be the prior probability of the en- do this for Inq in the future.
Recommended publications
  • Understanding Agent Incentives Using Causal Influence Diagrams
    Understanding Agent Incentives using Causal Influence Diagrams∗ Part I: Single Decision Settings Tom Everitt Pedro A. Ortega Elizabeth Barnes Shane Legg September 9, 2019 Deepmind Agents are systems that optimize an objective function in an environ- ment. Together, the goal and the environment induce secondary objectives, incentives. Modeling the agent-environment interaction using causal influ- ence diagrams, we can answer two fundamental questions about an agent’s incentives directly from the graph: (1) which nodes can the agent have an incentivize to observe, and (2) which nodes can the agent have an incentivize to control? The answers tell us which information and influence points need extra protection. For example, we may want a classifier for job applications to not use the ethnicity of the candidate, and a reinforcement learning agent not to take direct control of its reward mechanism. Different algorithms and training paradigms can lead to different causal influence diagrams, so our method can be used to identify algorithms with problematic incentives and help in designing algorithms with better incentives. Contents 1. Introduction 2 2. Background 3 3. Observation Incentives 7 4. Intervention Incentives 13 arXiv:1902.09980v6 [cs.AI] 6 Sep 2019 5. Related Work 19 6. Limitations and Future Work 22 7. Conclusions 23 References 24 A. Representing Uncertainty 29 B. Proofs 30 ∗ A number of people have been essential in preparing this paper. Ryan Carey, Eric Langlois, Michael Bowling, Tim Genewein, James Fox, Daniel Filan, Ray Jiang, Silvia Chiappa, Stuart Armstrong, Paul Christiano, Mayank Daswani, Ramana Kumar, Jonathan Uesato, Adria Garriga, Richard Ngo, Victoria Krakovna, Allan Dafoe, and Jan Leike have all contributed through thoughtful discussions and/or by reading drafts at various stages of this project.
    [Show full text]
  • Approximate Universal Artificial Intelligence And
    APPROXIMATEUNIVERSALARTIFICIAL INTELLIGENCE AND SELF-PLAY LEARNING FORGAMES Doctor of Philosophy Dissertation School of Computer Science and Engineering joel veness supervisors Kee Siong Ng Marcus Hutter Alan Blair William Uther John Lloyd January 2011 Joel Veness: Approximate Universal Artificial Intelligence and Self-play Learning for Games, Doctor of Philosophy Disserta- tion, © January 2011 When we write programs that learn, it turns out that we do and they don’t. — Alan Perlis ABSTRACT This thesis is split into two independent parts. The first is an investigation of some practical aspects of Marcus Hutter’s Uni- versal Artificial Intelligence theory [29]. The main contributions are to show how a very general agent can be built and analysed using the mathematical tools of this theory. Before the work presented in this thesis, it was an open question as to whether this theory was of any relevance to reinforcement learning practitioners. This work suggests that it is indeed relevant and worthy of future investigation. The second part of this thesis looks at self-play learning in two player, determin- istic, adversarial turn-based games. The main contribution is the introduction of a new technique for training the weights of a heuristic evaluation function from data collected by classical game tree search algorithms. This method is shown to outperform previous self-play training routines based on Temporal Difference learning when applied to the game of Chess. In particular, the main highlight was using this technique to construct a Chess program that learnt to play master level Chess by tuning a set of initially random weights from self play games.
    [Show full text]
  • Arxiv:2010.12268V1 [Cs.LG] 23 Oct 2020 Trained on a New Target Task Rapidly Loses in Its Ability to Solve Previous Source Tasks
    A Combinatorial Perspective on Transfer Learning Jianan Wang Eren Sezener David Budden Marcus Hutter Joel Veness DeepMind [email protected] Abstract Human intelligence is characterized not only by the capacity to learn complex skills, but the ability to rapidly adapt and acquire new skills within an ever-changing environment. In this work we study how the learning of modular solutions can allow for effective generalization to both unseen and potentially differently distributed data. Our main postulate is that the combination of task segmentation, modular learning and memory-based ensembling can give rise to generalization on an exponentially growing number of unseen tasks. We provide a concrete instantiation of this idea using a combination of: (1) the Forget-Me-Not Process, for task segmentation and memory based ensembling; and (2) Gated Linear Networks, which in contrast to contemporary deep learning techniques use a modular and local learning mechanism. We demonstrate that this system exhibits a number of desirable continual learning properties: robustness to catastrophic forgetting, no negative transfer and increasing levels of positive transfer as more tasks are seen. We show competitive performance against both offline and online methods on standard continual learning benchmarks. 1 Introduction Humans learn new tasks from a single temporal stream (online learning) by efficiently transferring experience of previously encountered tasks (continual learning). Contemporary machine learning algorithms struggle in both of these settings, and few attempts have been made to solve challenges at their intersection. Despite obvious computational inefficiencies, the dominant machine learning paradigm involves i.i.d. sampling of data at massive scale to reduce gradient variance and stabilize training via back-propagation.
    [Show full text]
  • On the Differences Between Human and Machine Intelligence
    On the Differences between Human and Machine Intelligence Roman V. Yampolskiy Computer Science and Engineering, University of Louisville [email protected] Abstract [Legg and Hutter, 2007a]. However, widespread implicit as- Terms Artificial General Intelligence (AGI) and Hu- sumption of equivalence between capabilities of AGI and man-Level Artificial Intelligence (HLAI) have been HLAI appears to be unjustified, as humans are not general used interchangeably to refer to the Holy Grail of Ar- intelligences. In this paper, we will prove this distinction. tificial Intelligence (AI) research, creation of a ma- Others use slightly different nomenclature with respect to chine capable of achieving goals in a wide range of general intelligence, but arrive at similar conclusions. “Lo- environments. However, widespread implicit assump- cal generalization, or “robustness”: … “adaptation to tion of equivalence between capabilities of AGI and known unknowns within a single task or well-defined set of HLAI appears to be unjustified, as humans are not gen- tasks”. … Broad generalization, or “flexibility”: “adapta- eral intelligences. In this paper, we will prove this dis- tion to unknown unknowns across a broad category of re- tinction. lated tasks”. …Extreme generalization: human-centric ex- treme generalization, which is the specific case where the 1 Introduction1 scope considered is the space of tasks and domains that fit within the human experience. We … refer to “human-cen- Imagine that tomorrow a prominent technology company tric extreme generalization” as “generality”. Importantly, as announces that they have successfully created an Artificial we deliberately define generality here by using human cog- Intelligence (AI) and offers for you to test it out.
    [Show full text]
  • Universal Artificial Intelligence Philosophical, Mathematical, and Computational Foundations of Inductive Inference and Intelligent Agents the Learn
    Universal Artificial Intelligence philosophical, mathematical, and computational foundations of inductive inference and intelligent agents the learn Marcus Hutter Australian National University Canberra, ACT, 0200, Australia http://www.hutter1.net/ ANU Universal Artificial Intelligence - 2 - Marcus Hutter Abstract: Motivation The dream of creating artificial devices that reach or outperform human intelligence is an old one, however a computationally efficient theory of true intelligence has not been found yet, despite considerable efforts in the last 50 years. Nowadays most research is more modest, focussing on solving more narrow, specific problems, associated with only some aspects of intelligence, like playing chess or natural language translation, either as a goal in itself or as a bottom-up approach. The dual, top down approach, is to find a mathematical (not computational) definition of general intelligence. Note that the AI problem remains non-trivial even when ignoring computational aspects. Universal Artificial Intelligence - 3 - Marcus Hutter Abstract: Contents In this course we will develop such an elegant mathematical parameter-free theory of an optimal reinforcement learning agent embedded in an arbitrary unknown environment that possesses essentially all aspects of rational intelligence. Most of the course is devoted to giving an introduction to the key ingredients of this theory, which are important subjects in their own right: Occam's razor; Turing machines; Kolmogorov complexity; probability theory; Solomonoff induction; Bayesian
    [Show full text]
  • QKSA: Quantum Knowledge Seeking Agent
    QKSA: Quantum Knowledge Seeking Agent motivation, core thesis and baseline framework Aritra Sarkar Department of Quantum & Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, The Netherlands 1 Introduction In this article we present the motivation and the core thesis towards the implementation of a Quantum Knowledge Seeking Agent (QKSA). QKSA is a general reinforcement learning agent that can be used to model classical and quantum dynamics. It merges ideas from universal artificial general intelligence, con- structor theory and genetic programming to build a robust and general framework for testing the capabilities of the agent in a variety of environments. It takes the artificial life (or, animat) path to artificial general intelligence where a population of intelligent agents are instantiated to explore valid ways of modeling the perceptions. The multiplicity and survivability of the agents are defined by the fitness, with respect to the explainability and predictability, of a resource-bounded computational model of the environment. This general learning approach is then employed to model the physics of an environment based on subjective ob- server states of the agents. A specific case of quantum process tomography as a general modeling principle is presented. The various background ideas and a baseline formalism is discussed in this article which sets the groundwork for the implementations of the QKSA that are currently in active development. Section 2 presents a historic overview of the motivation behind this research In Section 3 we survey some general reinforcement learning models and bio-inspired computing techniques that forms a baseline for the design of the QKSA.
    [Show full text]
  • The Fastest and Shortest Algorithm for All Well-Defined Problems
    Technical Report IDSIA-16-00, 3 March 2001 ftp://ftp.idsia.ch/pub/techrep/IDSIA-16-00.ps.gz The Fastest and Shortest Algorithm for All Well-Defined Problems1 Marcus Hutter IDSIA, Galleria 2, CH-6928 Manno-Lugano, Switzerland [email protected] http://www.idsia.ch/∼marcus Key Words Acceleration, Computational Complexity, Algorithmic Information Theory, Kol- mogorov Complexity, Blum’s Speed-up Theorem, Levin Search. Abstract An algorithm M is described that solves any well-defined problem p as quickly as the fastest algorithm computing a solution to p, save for a factor of 5 and low- order additive terms. M optimally distributes resources between the execution arXiv:cs/0206022v1 [cs.CC] 14 Jun 2002 of provably correct p-solving programs and an enumeration of all proofs, including relevant proofs of program correctness and of time bounds on program runtimes. M avoids Blum’s speed-up theorem by ignoring programs without correctness proof. M has broader applicability and can be faster than Levin’s universal search, the fastest method for inverting functions save for a large multiplicative constant. An extension of Kolmogorov complexity and two novel natural measures of function complexity are used to show that the most efficient program computing some function f is also among the shortest programs provably computing f. 1Published in the International Journal of Foundations of Computer Science, Vol. 13, No. 3, (June 2002) 431–443. Extended version of An effective Procedure for Speeding up Algorithms (cs.CC/0102018) presented at Workshops MaBiC-2001 & TAI-2001. Marcus Hutter, The Fastest and Shortest Algorithm 1 1 Introduction & Main Result Searching for fast algorithms to solve certain problems is a central and difficult task in computer science.
    [Show full text]
  • The Relativity of Induction
    The Relativity of Induction Larry Muhlstein Department of Cognitive Science University of California San Diego San Diego, CA 94703 [email protected] Abstract Lately there has been a lot of discussion about why deep learning algorithms per- form better than we would theoretically suspect. To get insight into this question, it helps to improve our understanding of how learning works. We explore the core problem of generalization and show that long-accepted Occam’s razor and parsimony principles are insufficient to ground learning. Instead, we derive and demonstrate a set of relativistic principles that yield clearer insight into the nature and dynamics of learning. We show that concepts of simplicity are fundamentally contingent, that all learning operates relative to an initial guess, and that general- ization cannot be measured or strongly inferred, but that it can be expected given enough observation. Using these principles, we reconstruct our understanding in terms of distributed learning systems whose components inherit beliefs and update them. We then apply this perspective to elucidate the nature of some real world inductive processes including deep learning. Introduction We have recently noticed a significant gap between our theoretical understanding of how machine learning works and the results of our experiments and systems. The field has experienced a boom in the scope of problems that can be tackled with machine learning methods, yet is lagging behind in deeper understanding of these tools. Deep networks often generalize successfully despite having more parameters than examples[1], and serious concerns[2] have been raised that our full suite of theoretical techniques including VC theory[3], Rademacher complexity[4], and uniform convergence[5] are unable to account for why[6].
    [Show full text]
  • Comp4620/8620: Advanced Topics in AI Foundations of Artificial Intelligence
    comp4620/8620: Advanced Topics in AI Foundations of Artificial Intelligence Marcus Hutter Australian National University Canberra, ACT, 0200, Australia http://www.hutter1.net/ ANU Foundations of Artificial Intelligence - 2 - Marcus Hutter Abstract: Motivation The dream of creating artificial devices that reach or outperform human intelligence is an old one, however a computationally efficient theory of true intelligence has not been found yet, despite considerable efforts in the last 50 years. Nowadays most research is more modest, focussing on solving more narrow, specific problems, associated with only some aspects of intelligence, like playing chess or natural language translation, either as a goal in itself or as a bottom-up approach. The dual, top down approach, is to find a mathematical (not computational) definition of general intelligence. Note that the AI problem remains non-trivial even when ignoring computational aspects. Foundations of Artificial Intelligence - 3 - Marcus Hutter Abstract: Contents In this course we will develop such an elegant mathematical parameter-free theory of an optimal reinforcement learning agent embedded in an arbitrary unknown environment that possesses essentially all aspects of rational intelligence. Most of the course is devoted to giving an introduction to the key ingredients of this theory, which are important subjects in their own right: Occam's razor; Turing machines; Kolmogorov complexity; probability theory; Solomonoff induction; Bayesian sequence prediction; minimum description length principle; agents;
    [Show full text]
  • Realab: an Embedded Perspective on Tampering
    REALab: An Embedded Perspective on Tampering Ramana Kumar∗ Jonathan Uesato∗ Richard Ngo Tom Everitt Victoria Krakovna Shane Legg Abstract This paper describes REALab, a platform for embedded agency research in reinforce- ment learning (RL). REALab is designed to model the structure of tampering problems that may arise in real-world deployments of RL. Standard Markov Decision Process (MDP) formulations of RL and simulated environments mirroring the MDP structure assume secure access to feedback (e.g., rewards). This may be unrealistic in settings where agents are embedded and can corrupt the processes producing feedback (e.g., human supervisors, or an implemented reward function). We describe an alternative Corrupt Feedback MDP formulation and the REALab environment platform, which both avoid the secure feedback assumption. We hope the design of REALab provides a useful perspective on tampering problems, and that the platform may serve as a unit test for the presence of tampering incentives in RL agent designs. 1 Introduction Tampering problems, where an AI agent interferes with whatever represents or commu- nicates its intended objective and pursues the resulting corrupted objective instead, are a staple concern in the AGI safety literature [Amodei et al., 2016, Bostrom, 2014, Everitt and Hutter, 2016, Everitt et al., 2017, Armstrong and O’Rourke, 2017, Everitt and Hutter, 2019, Armstrong et al., 2020]. Variations on the idea of tampering include wireheading, where an agent learns how to stimulate its reward mechanism directly, and the off-switch or shutdown problem, where an agent interferes with its supervisor’s ability to halt the agent’s operation. Many real-world concerns can be formulated as tampering problems, as we will show (§2.1, §4.1).
    [Show full text]
  • Universal Artificial Intelligence
    Universal Artificial Intelligence Marcus Hutter Canberra, ACT, 0200, Australia http://www.hutter1.net/ ANU RSISE NICTA Machine Learning Summer School MLSS-2010, 27 September { 6 October, Canberra Marcus Hutter - 2 - Foundations of Intelligent Agents Abstract The dream of creating arti¯cial devices that reach or outperform human intelligence is many centuries old. This tutorial presents the elegant parameter-free theory, developed in [Hut05], of an optimal reinforcement learning agent embedded in an arbitrary unknown environment that possesses essentially all aspects of rational intelligence. The theory reduces all conceptual AI problems to pure computational questions. How to perform inductive inference is closely related to the AI problem. The tutorial covers Solomono®'s theory, elaborated on in [Hut07], which solves the induction problem, at least from a philosophical and statistical perspective. Both theories are based on Occam's razor quanti¯ed by Kolmogorov complexity; Bayesian probability theory; and sequential decision theory. Marcus Hutter - 3 - Foundations of Intelligent Agents TABLE OF CONTENTS 1. PHILOSOPHICAL ISSUES 2. BAYESIAN SEQUENCE PREDICTION 3. UNIVERSAL INDUCTIVE INFERENCE 4. UNIVERSAL ARTIFICIAL INTELLIGENCE 5. APPROXIMATIONS AND APPLICATIONS 6. FUTURE DIRECTION, WRAP UP, LITERATURE Marcus Hutter - 4 - Foundations of Intelligent Agents PHILOSOPHICAL ISSUES ² Philosophical Problems ² What is (Arti¯cial) Intelligence? ² How to do Inductive Inference? ² How to Predict (Number) Sequences? ² How to make Decisions in Unknown Environments? ² Occam's Razor to the Rescue ² The Grue Emerald and Con¯rmation Paradoxes ² What this Tutorial is (Not) About Marcus Hutter - 5 - Foundations of Intelligent Agents Philosophical Issues: Abstract I start by considering the philosophical problems concerning arti¯cial intelligence and machine learning in general and induction in particular.
    [Show full text]
  • Categorizing Wireheading in Partially Embedded Agents
    Categorizing Wireheading in Partially Embedded Agents Arushi Majha1 , Sayan Sarkar2 and Davide Zagami3 1University of Cambridge 2IISER Pune 3RAISE ∗ [email protected], [email protected], [email protected] Abstract able to locate and edit that memory address to contain what- ever value corresponds to the highest reward. Chances that Embedded agents are not explicitly separated from such behavior will be incentivized increase as we develop their environment, lacking clear I/O channels. Such ever more intelligent agents1. agents can reason about and modify their internal The discussion of AI systems has thus far been dominated parts, which they are incentivized to shortcut or by dualistic models where the agent is clearly separated from wirehead in order to achieve the maximal reward. its environment, has well-defined input/output channels, and In this paper, we provide a taxonomy of ways by does not have any control over the design of its internal parts. which wireheading can occur, followed by a defini- Recent work on these problems [Demski and Garrabrant, tion of wirehead-vulnerable agents. Starting from 2019; Everitt and Hutter, 2018; Everitt et al., 2019] provides the fully dualistic universal agent AIXI, we intro- a taxonomy of ways in which embedded agents violate essen- duce a spectrum of partially embedded agents and tial assumptions that are usually granted in dualistic formula- identify wireheading opportunities that such agents tions, such as with the universal agent AIXI [Hutter, 2004]. can exploit, experimentally demonstrating the re- Wireheading can be considered one particular class of mis- sults with the GRL simulation platform AIXIjs. We alignment [Everitt and Hutter, 2018], a divergence between contextualize wireheading in the broader class of the goals of the agent and the goals of its designers.
    [Show full text]