Move from Perturbed scheme to exponential weighting average
نویسنده
چکیده
In an online decision problem, one makes decisions often with a pool of decisions’ sequence called experts but without knowledge of the future. After each step, one pays a cost based on the decision and observed rate. One reasonal goal would be to perform as well as the best expert in the pool. The modern and well-known way to attain this goal is the algorithm of exponential weighting. However, recently, another algorithm called follow the perturbed leader is developed and achieved about the same performance. In our work, we first show the properties shared in common by the two algorithms which explain the similarities on the performance. Next we will show that for a specific perturbation, the two algorithms are identical. Finally, we show with some examples that follow-the-leader style algorithms extend naturally to a large class of structured online problems for which the exponential algorithms are inefficient. 1 Online problem setting In an online decision problem, one makes decisions often with a pool of decisions’ sequence called experts but without knowledge of the future. After each step, one pays a cost based on the decision and observed state. As there is no prior knowledge on the accuracy of experts in the pool, one reasonable goal for this general problem would be to perform as well as the best expert in the pool after a number of steps. More precisely, we consider the following mathematical problem: • A set S of experts is given. • The algorithm interacts with an adversary in a series of T steps. • In each step j, the algorithm picks an expert xj ∈ S , and the adversary selects a cost function cj: S → R. The adversary could be adaptive, in that cj may depend on {xi : i < j}. • The algorithm incurs cost , and receives as feedback the value of cj(xj). • Minimize the algorithm’s regret which is defined as difference in expected cost between the algorithm’s sequence of choices and that of best fixed expert in S:
منابع مشابه
An efficient numerical method for singularly perturbed second order ordinary differential equation
In this paper an exponentially fitted finite difference method is presented for solving singularly perturbed two-point boundary value problems with the boundary layer. A fitting factor is introduced and the model equation is discretized by a finite difference scheme on an uniform mesh. Thomas algorithm is used to solve the tri-diagonal system. The stability of the algorithm is investigated. It ...
متن کاملConstruction of strict Lyapunov function for nonlinear parameterised perturbed systems
In this paper, global uniform exponential stability of perturbed dynamical systems is studied by using Lyapunov techniques. The system presents a perturbation term which is bounded by an integrable function with the assumption that the nominal system is globally uniformly exponentially stable. Some examples in dimensional two are given to illustrate the applicability of the main results.
متن کاملA Parameter Uniform Numerical Scheme for Singularly Perturbed Differential-difference Equations with Mixed Shifts
In this paper, we consider a second-order singularly perturbed differential-difference equations with mixed delay and advance parameters. At first, we approximate the model problem by an upwind finite difference scheme on a Shishkin mesh. We know that the upwind scheme is stable and its solution is oscillation free, but it gives lower order of accuracy. So, to increase the convergence, we propo...
متن کاملOnline Prediction with Privacy
In this paper, we consider online prediction from expert advice in a situation where each expert observes its own loss at each time while the loss cannot be disclosed to others for reasons of privacy or confidentiality preservation. Our secure exponential weighting scheme enables exploitation of such private loss values by making use of cryptographic tools. We proved that the regret bound of th...
متن کاملDetection of perturbed quantization (PQ) steganography based on empirical matrix
Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1512.07074 شماره
صفحات -
تاریخ انتشار 2015