-
From Linear to Linearizable Optimization: A Novel Framework with Applications to Stationary and Non-stationary DR-submodular Optimization
Authors:
Mohammad Pedramfar,
Vaneet Aggarwal
Abstract:
This paper introduces the notion of upper linearizable/quadratizable functions, a class that extends concavity and DR-submodularity in various settings, including monotone and non-monotone cases over different convex sets. A general meta-algorithm is devised to convert algorithms for linear/quadratic maximization into ones that optimize upper quadratizable functions, offering a unified approach to…
▽ More
This paper introduces the notion of upper linearizable/quadratizable functions, a class that extends concavity and DR-submodularity in various settings, including monotone and non-monotone cases over different convex sets. A general meta-algorithm is devised to convert algorithms for linear/quadratic maximization into ones that optimize upper quadratizable functions, offering a unified approach to tackling concave and DR-submodular optimization problems. The paper extends these results to multiple feedback settings, facilitating conversions between semi-bandit/first-order feedback and bandit/zeroth-order feedback, as well as between first/zeroth-order feedback and semi-bandit/bandit feedback. Leveraging this framework, new algorithms are derived using existing results as base algorithms for convex optimization, improving upon state-of-the-art results in various cases. Dynamic and adaptive regret guarantees are obtained for DR-submodular maximization, marking the first algorithms to achieve such guarantees in these settings. Notably, the paper achieves these advancements with fewer assumptions compared to existing state-of-the-art results, underscoring its broad applicability and theoretical contributions to non-convex optimization.
△ Less
Submitted 13 May, 2024; v1 submitted 27 April, 2024;
originally announced May 2024.
-
Unified Projection-Free Algorithms for Adversarial DR-Submodular Optimization
Authors:
Mohammad Pedramfar,
Yididiya Y. Nadew,
Christopher J. Quinn,
Vaneet Aggarwal
Abstract:
This paper introduces unified projection-free Frank-Wolfe type algorithms for adversarial continuous DR-submodular optimization, spanning scenarios such as full information and (semi-)bandit feedback, monotone and non-monotone functions, different constraints, and types of stochastic queries. For every problem considered in the non-monotone setting, the proposed algorithms are either the first wit…
▽ More
This paper introduces unified projection-free Frank-Wolfe type algorithms for adversarial continuous DR-submodular optimization, spanning scenarios such as full information and (semi-)bandit feedback, monotone and non-monotone functions, different constraints, and types of stochastic queries. For every problem considered in the non-monotone setting, the proposed algorithms are either the first with proven sub-linear $α$-regret bounds or have better $α$-regret bounds than the state of the art, where $α$ is a corresponding approximation bound in the offline setting. In the monotone setting, the proposed approach gives state-of-the-art sub-linear $α$-regret bounds among projection-free algorithms in 7 of the 8 considered cases while matching the result of the remaining case. Additionally, this paper addresses semi-bandit and bandit feedback for adversarial DR-submodular optimization, advancing the understanding of this optimization area.
△ Less
Submitted 26 April, 2024; v1 submitted 15 March, 2024;
originally announced March 2024.
-
A Generalized Approach to Online Convex Optimization
Authors:
Mohammad Pedramfar,
Vaneet Aggarwal
Abstract:
In this paper, we analyze the problem of online convex optimization in different settings. We show that any algorithm for online linear optimization with fully adaptive adversaries is an algorithm for online convex optimization. We also show that any such algorithm that requires full-information feedback may be transformed to an algorithm with semi-bandit feedback with comparable regret bound. We…
▽ More
In this paper, we analyze the problem of online convex optimization in different settings. We show that any algorithm for online linear optimization with fully adaptive adversaries is an algorithm for online convex optimization. We also show that any such algorithm that requires full-information feedback may be transformed to an algorithm with semi-bandit feedback with comparable regret bound. We further show that algorithms that are designed for fully adaptive adversaries using deterministic semi-bandit feedback can obtain similar bounds using only stochastic semi-bandit feedback when facing oblivious adversaries. We use this to describe general meta-algorithms to convert first order algorithms to zeroth order algorithms with comparable regret bounds. Our framework allows us to analyze online optimization in various settings, such full-information feedback, bandit feedback, stochastic regret, adversarial regret and various forms of non-stationary regret.
△ Less
Submitted 13 May, 2024; v1 submitted 13 February, 2024;
originally announced February 2024.
-
Improved Bayesian Regret Bounds for Thompson Sampling in Reinforcement Learning
Authors:
Ahmadreza Moradipari,
Mohammad Pedramfar,
Modjtaba Shokrian Zini,
Vaneet Aggarwal
Abstract:
In this paper, we prove the first Bayesian regret bounds for Thompson Sampling in reinforcement learning in a multitude of settings. We simplify the learning problem using a discrete set of surrogate environments, and present a refined analysis of the information ratio using posterior consistency. This leads to an upper bound of order $\widetilde{O}(H\sqrt{d_{l_1}T})$ in the time inhomogeneous rei…
▽ More
In this paper, we prove the first Bayesian regret bounds for Thompson Sampling in reinforcement learning in a multitude of settings. We simplify the learning problem using a discrete set of surrogate environments, and present a refined analysis of the information ratio using posterior consistency. This leads to an upper bound of order $\widetilde{O}(H\sqrt{d_{l_1}T})$ in the time inhomogeneous reinforcement learning problem where $H$ is the episode length and $d_{l_1}$ is the Kolmogorov $l_1-$dimension of the space of environments. We then find concrete bounds of $d_{l_1}$ in a variety of settings, such as tabular, linear and finite mixtures, and discuss how how our results are either the first of their kind or improve the state-of-the-art.
△ Less
Submitted 6 February, 2024; v1 submitted 30 October, 2023;
originally announced October 2023.
-
Two-tiered Online Optimization of Region-wide Datacenter Resource Allocation via Deep Reinforcement Learning
Authors:
Chang-Lin Chen,
Hanhan Zhou,
Jiayu Chen,
Mohammad Pedramfar,
Vaneet Aggarwal,
Tian Lan,
Zheqing Zhu,
Chi Zhou,
Tim Gasser,
Pol Mauri Ruiz,
Vijay Menon,
Neeraj Kumar,
Hongbo Dong
Abstract:
This paper addresses the important need for advanced techniques in continuously allocating workloads on shared infrastructures in data centers, a problem arising due to the growing popularity and scale of cloud computing. It particularly emphasizes the scarcity of research ensuring guaranteed capacity in capacity reservations during large-scale failures. To tackle these issues, the paper presents…
▽ More
This paper addresses the important need for advanced techniques in continuously allocating workloads on shared infrastructures in data centers, a problem arising due to the growing popularity and scale of cloud computing. It particularly emphasizes the scarcity of research ensuring guaranteed capacity in capacity reservations during large-scale failures. To tackle these issues, the paper presents scalable solutions for resource management. It builds on the prior establishment of capacity reservation in cluster management systems and the two-level resource allocation problem addressed by the Resource Allowance System (RAS). Recognizing the limitations of Mixed Integer Linear Programming (MILP) for server assignment in a dynamic environment, this paper proposes the use of Deep Reinforcement Learning (DRL), which has been successful in achieving long-term optimal results for time-varying systems. A novel two-level design that utilizes a DRL-based algorithm is introduced to solve optimal server-to-reservation assignment, taking into account of fault tolerance, server movement minimization, and network affinity requirements due to the impracticality of directly applying DRL algorithms to large-scale instances with millions of decision variables. The paper explores the interconnection of these levels and the benefits of such an approach for achieving long-term optimal results in the context of large-scale cloud systems. We further show in the experiment section that our two-level DRL approach outperforms the MIP solver and heuristic approaches and exhibits significantly reduced computation time compared to the MIP solver. Specifically, our two-level DRL approach performs 15% better than the MIP solver on minimizing the overall cost. Also, it uses only 26 seconds to execute 30 rounds of decision making, while the MIP solver needs nearly an hour.
△ Less
Submitted 29 June, 2023;
originally announced June 2023.
-
A Unified Approach for Maximizing Continuous DR-submodular Functions
Authors:
Mohammad Pedramfar,
Christopher John Quinn,
Vaneet Aggarwal
Abstract:
This paper presents a unified approach for maximizing continuous DR-submodular functions that encompasses a range of settings and oracle access types. Our approach includes a Frank-Wolfe type offline algorithm for both monotone and non-monotone functions, with different restrictions on the general convex set. We consider settings where the oracle provides access to either the gradient of the funct…
▽ More
This paper presents a unified approach for maximizing continuous DR-submodular functions that encompasses a range of settings and oracle access types. Our approach includes a Frank-Wolfe type offline algorithm for both monotone and non-monotone functions, with different restrictions on the general convex set. We consider settings where the oracle provides access to either the gradient of the function or only the function value, and where the oracle access is either deterministic or stochastic. We determine the number of required oracle accesses in all cases. Our approach gives new/improved results for nine out of the sixteen considered cases, avoids computationally expensive projections in two cases, with the proposed framework matching performance of state-of-the-art approaches in the remaining five cases. Notably, our approach for the stochastic function value-based oracle enables the first regret bounds with bandit feedback for stochastic DR-submodular functions.
△ Less
Submitted 12 January, 2024; v1 submitted 26 May, 2023;
originally announced May 2023.
-
Stochastic Submodular Bandits with Delayed Composite Anonymous Bandit Feedback
Authors:
Mohammad Pedramfar,
Vaneet Aggarwal
Abstract:
This paper investigates the problem of combinatorial multiarmed bandits with stochastic submodular (in expectation) rewards and full-bandit delayed feedback, where the delayed feedback is assumed to be composite and anonymous. In other words, the delayed feedback is composed of components of rewards from past actions, with unknown division among the sub-components. Three models of delayed feedback…
▽ More
This paper investigates the problem of combinatorial multiarmed bandits with stochastic submodular (in expectation) rewards and full-bandit delayed feedback, where the delayed feedback is assumed to be composite and anonymous. In other words, the delayed feedback is composed of components of rewards from past actions, with unknown division among the sub-components. Three models of delayed feedback: bounded adversarial, stochastic independent, and stochastic conditionally independent are studied, and regret bounds are derived for each of the delay models. Ignoring the problem dependent parameters, we show that regret bound for all the delay models is $\tilde{O}(T^{2/3} + T^{1/3} ν)$ for time horizon $T$, where $ν$ is a delay parameter defined differently in the three cases, thus demonstrating an additive term in regret with delay in all the three delay models. The considered algorithm is demonstrated to outperform other full-bandit approaches with delayed composite anonymous feedback.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
Coagent Networks Revisited
Authors:
Modjtaba Shokrian Zini,
Mohammad Pedramfar,
Matthew Riemer,
Ahmadreza Moradipari,
Miao Liu
Abstract:
Coagent networks formalize the concept of arbitrary networks of stochastic agents that collaborate to take actions in a reinforcement learning environment. Prominent examples of coagent networks in action include approaches to hierarchical reinforcement learning (HRL), such as those using options, which attempt to address the exploration exploitation trade-off by introducing abstract actions at di…
▽ More
Coagent networks formalize the concept of arbitrary networks of stochastic agents that collaborate to take actions in a reinforcement learning environment. Prominent examples of coagent networks in action include approaches to hierarchical reinforcement learning (HRL), such as those using options, which attempt to address the exploration exploitation trade-off by introducing abstract actions at different levels by sequencing multiple stochastic networks within the HRL agents. We first provide a unifying perspective on the many diverse examples that fall under coagent networks. We do so by formalizing the rules of execution in a coagent network, enabled by the novel and intuitive idea of execution paths in a coagent network. Motivated by parameter sharing in the hierarchical option-critic architecture, we revisit the coagent network theory and achieve a much shorter proof of the policy gradient theorem using our idea of execution paths, without any assumption on how parameters are shared among coagents. We then generalize our setting and proof to include the scenario where coagents act asynchronously. This new perspective and theorem also lead to more mathematically accurate and performant algorithms than those in the existing literature. Lastly, by running nonstationary RL experiments, we survey the performance and properties of different generalizations of option-critic models.
△ Less
Submitted 29 August, 2023; v1 submitted 28 January, 2020;
originally announced January 2020.
-
Hairy Cantor sets
Authors:
Davoud Cheraghi,
Mohammad Pedramfar
Abstract:
We introduce a topological object, called hairy Cantor set, which in many ways enjoys the universal features of objects like Jordan curve, Cantor set, Cantor bouquet, hairy Jordan curve, etc. We give an axiomatic characterisation of hairy Cantor sets, and prove that any two such objects in the plane are ambiently homeomorphic.
Hairy Cantor sets appear in the study of the dynamics of holomorphic…
▽ More
We introduce a topological object, called hairy Cantor set, which in many ways enjoys the universal features of objects like Jordan curve, Cantor set, Cantor bouquet, hairy Jordan curve, etc. We give an axiomatic characterisation of hairy Cantor sets, and prove that any two such objects in the plane are ambiently homeomorphic.
Hairy Cantor sets appear in the study of the dynamics of holomorphic maps with infinitely many renormalisation structures. They are employed to link the fundamental concepts of polynomial-like renormalisation by Douady-Hubbard with the arithmetic conditions obtained by Herman-Yoccoz in the study of the dynamics of analytic circle diffeomorphisms.
△ Less
Submitted 7 July, 2019;
originally announced July 2019.
-
On the relation between connectivity, independence and generalized caterpillars
Authors:
M. Pedramfar,
M. Shokrian,
M. Tefagh
Abstract:
A spanning generalized caterpillar is a spanning tree in which all vertices of degree more than two are on a path. In this note, we find a relation between the existence of spanning generalized caterpillar and the independence and connectivity number in a graph. We also point out to an error in a "theorem" in the paper "Spanning spiders and light-splitting switches", by L. Gargano et al. in Discre…
▽ More
A spanning generalized caterpillar is a spanning tree in which all vertices of degree more than two are on a path. In this note, we find a relation between the existence of spanning generalized caterpillar and the independence and connectivity number in a graph. We also point out to an error in a "theorem" in the paper "Spanning spiders and light-splitting switches", by L. Gargano et al. in Discrete Math. (2004), and find out a relation between another mentioned theorem and the existence of spanning generalized caterpillar.
△ Less
Submitted 20 February, 2013;
originally announced February 2013.