Better safe than sorry: Risky function exploitation through safe optimization

نویسندگان

  • Eric Schulz
  • Quentin J. M. Huys
  • Dominik R. Bach
  • Maarten Speekenbrink
  • Andreas Krause
چکیده

Exploration-exploitation of functions, that is learning and optimizing a mapping between inputs and expected outputs, is ubiquitous to many real world situations. These situations sometimes require us to avoid certain outcomes at all cost, for example because they are poisonous, harmful, or otherwise dangerous. We test participants’ behavior in scenarios in which they have to find the optimum of a function while at the same time avoid outputs below a certain threshold. In two experiments, we find that Safe-Optimization, a Gaussian Process-based exploration-exploitation algorithm, describes participants’ behavior well and that participants seem to care firstly whether a point is safe and then try to pick the optimal point from all such safe points. This means that their trade-off between exploration and exploitation can be seen as an intelligent, approximate, and homeostasis-driven strategy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Better Safe than Sorry: Precautionary Reasoning and Implied Dominance in Risky Decisions

Manuscript under review. Please do not quote without permission. Better Safe than Sorry 2 Manusctipt under review. Please do not quote without permission. ABSTRACT In four studies, student and nonstudent participants evaluated the possible outcomes of binary decisions involving health, safety, and environmental risks (e.g., whether to issue a dam-failure evacuation order). Many participants ind...

متن کامل

Better Safe than Sorry: A Conceptual Framework for the Use of the Cloud

Cloud computing has come to stay and is expanding rapidly. The mode of deployment of services has implications for users who store data in the cloud and risk exposure to potentially severeconsequences. The safe use of cloud computing services is therefore necessitated. Drawing on the principle of self-preservation and the theory of protection motivation, this paper develops a conceptual framewo...

متن کامل

Strategic Experimentation with Heterogeneous Agents and Payoff Externalities

In this paper, I examine the effect of introducing heterogeneity between players in models of strategic experimentation. I consider a two-armed bandit problem with one safe arm and a risky arm. There are two players and each has an access to such a bandit. A player using the safe arm experiences a safe flow payoff . The risky arm can either be good or bad. A bad risky arm is worse than the safe...

متن کامل

Descriptive Study of Students’ Knowledge, Attitudes, and Practices toward Safe Sex in Niger Delta University in, Bayelsa State, Nigeria

Background & aim: Spread of sexually transmitted infections can be controlled with enhancing the knowledge and correcting the attitudes of students regarding the right and consistent use of contraceptive methods, and being in monogamous sexual relationships. This study aimed to compare thestudents’ knowledge, attitudes, and safe sex practices between nursing and non-nu...

متن کامل

Virtually ‘in the heat of the moment’: insula activation in safe sex negotiation among risky men

HIV is most prevalent among men who have sex with men (MSM), and although most MSM use condoms consistently during casual sex, some take risks. To better understand the psychology of those risky decisions, we examined neural correlates of playing a virtual sexual 'hook up' game in an functional magnetic resonance imaging scanner in MSM who had, in the past 90 days, been sexually risky (N = 76) ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1602.01052  شماره 

صفحات  -

تاریخ انتشار 2016