Contextual Thompson Sampling
Patrick Nicolas
Director Data Engineering @ aidéo technologies |software & data engineering, operations, and machine learning.
In this article, we delve into the notion of the multi-armed bandit, also known as the?K-armed bandit, with a particular focus on Thompson sampling as applied to the contextual bandit.
What you will learn:?How to add contextual information as prior to the Thompson sampling algorithm.
Multi-arm bandit problem
The multi-armed bandit problem is a well-known reinforcement learning technique, ?widely used for its simplicity. Let's consider a ?slot machine with n arms (bandits) with each arm having its own biased probability distribution of success. In its simplest form pulling any one of the arms gives you a ?reward of either 1 for success, or 0 for failure.?
Our objective is to pull the arms one-by-one in sequence such that we maximize our total reward collected in the long run.?
Data scientists have developed several solutions to tackle the multi-armed bandit problem for?which the 3 most common algorithms are:
Epsilon-greedy
The Epsilon-greedy algorithm stands as the most straightforward method for navigating the exploration-exploitation dilemma. In the exploitation phase, it consistently chooses the lever with the highest recorded payoff. Nevertheless, occasionally (with a frequency of?ε, where ε is less than 0.1), it opts for a random lever to 'explore'—this allows for the investigation of levers whose payouts are not well-known. Levers with established or confirmed high payouts are selected the majority of the time, specifically?(1-ε)?of the instances.
Upper Confidence Bound (UCB)
The Upper Confidence Bound (UCB) algorithm is arguably the most popular approach to solving the multi-armed bandit problem. It is occasionally described by the principle of 'Optimism in the Face of Uncertainty': It operates under the assumption that the uncertain average rewards of each option will be on the higher end, according to past outcomes.
Thompson sampling
The?Thompson sampling?algorithm is essentially a?Bayesian optimization method. Its central tenet, known as the?probability matching strategy,?can be distilled to the concept of 'selecting a lever based on its likelihood of being the optimal choice.' This means the frequency of choosing a specific lever should correspond to its actual chances of being the best lever available.
The following diagram illustrates the difference between the upper confidence bounds and the Thompson sampling.
Context anyone?
The methods discussed previously do not presume any specifics about the environment or the agent that is choosing the options. There are two scenarios:
All of the strategies suited to the multi-armed bandit problem can be adapted for use with or without context. The following sections will concentrate on the problem of the contextual multi-armed bandit.
Contextual Thompson sampling (CTS)
Let's dive into the key characteristics of the Thompson sampling
The components of the contextual Thompson sampling are
1. Model of parameters?w
2. A prior distribution?p(w)?of the model
领英推荐
3. History?H?consisting of a context?x?and reward?r
4. Likelihood or probability?p(r|x, w)?of a reward given a context?x?and parameters?w
5. Posterior distribution computed using?na?ve Bayes?
But how can we model a context?
Actually, a process to select the most rewarding arm is actually a predictor or a learner. Each predictor takes the context, defines as a vector of features and predicts which arm will generate the highest reward.
The predictor is a model that can be defined as
The algorithm is implemented as a linear model (weights?w) for estimating the reward from a context?x??as
The ultimate objective for any reinforcement learning model is to extract a policy which quantifies the behavior of the agent. Given a set?X?of context?xi?and a set?A?of arms, the policy?π??is defined by the selection of an arm given a context?x
with the following variables initialization:
At each iteration:
The sampling of the normal distribution (line?1) is described in details in the post?Multivariate Normal Sampling with Scala. The algorithm computes the maximum reward estimation through sampling the normal distribution (line?2) and play the arm?a*?associated to it (line?3). The parameters?V?and?b?are updated with the estimated value (line?5?and?6) and the actual reward Rt?is computed (line?8) after the weights of the context?w?are updated (line?7).
Thank you for reading this article. For more information ...
References
---------------------------
Patrick Nicolas has over 25 years of experience in software and data engineering, architecture design and end-to-end deployment and support with extensive knowledge in machine learning.? He has been director of data engineering at Aideo Technologies since 2017 and he is the?author of "Scala for Machine Learning" Packt Publishing ISBN 978-1-78712-238-3