ML 4: Kit & Kaboodle

26 June, 2020 - 108 min read



Notes from Sutton & Barto's "Reinforcement Learning: an Introduction".


"Capital letters are used for random variables and major algorithm variables. Lower case letters are used for the values of random variables and for scalar functions. Quantities that are required to be real-valued vectors are written in bold and in lower case (even if random variables)."

Variable Meaning
ss state
aa action
S\mathcal{S} set of all nonterminal states
S+\mathcal{S}^{+} set of all states, including the terminal state
A(s)\mathcal{A}(s) set of possible in state ss
R\mathcal{R} set of possible rewards
tt discrete time step
TT final time step of an episode
StS_t state at tt
AtA_t action at tt
RtR_t reward at tt, dependent, like StS_t, on At1A_{t-1} and St1S_{t-1}
GtG_t return (cumulative discounted reward) following tt
Gt(n)G^{(n)}_t nn-step return
Gt(λ)G^{(\lambda)}_t λ\lambda-step return
π\pi policy, decision-making rule
π\pi_* the optimal policy
π(s)\pi (s) action take in state ss under deterministicdeterministic policy π\pi
π(as)\pi(a \vert s) probability of taking action aa in state ss under stochasticstochastic policy π\pi
p(s,rs,a)p(s', r \vert s, a) probability of transition to state ss', with reward rr from s,as, a
vπ(s)v_\pi(s) value of state ss under policy π\pi (expected return)
v(s)v_*(s) value of state ss under the optimal policy
qπ(s,a)q_\pi(s,a) value of taking action aa in state ss under policy π\pi
q(s,a)q_*(s,a) value of taking action aa in state ss the optimal policy
Vt(s)V_t(s) estimate (a random variable) of vπ(s)v_\pi(s) or v(s)v_*(s)
Qt(s,a)Q_t(s,a) estimate (a random variable) of qπ(s,a)q_\pi(s,a) or q(s,a)q_*(s,a)
v^(s,w)\hat{v}(s, \bold{w}) approximate value of state ss given a vector of weights w\bold{w}
q^(s,a,w)\hat{q}(s, a, \bold{w}) approximate value of a state-action par s,as,a given weights w\bold{w}
w,wt\bold{w}, \bold{w}_t vector of (possibly learned) weightsweights underlying an approximate value function w\bold{w}
x(s)\bold{x}(s) vector of features visible when in state ss
wx\bold{w^{\top}x} inner product of vectors wx=iwixi\bold{w^{\top}x} = \sum_i w_i x_i, e.g.v^(s,w=wx)\hat{v}(s, \bold{w} = \bold{w^{\top}x})
δt\delta_t temporal-difference error at tt (a random variable, even though not upper case)
Et(s)E_t(s) eligibility trace for state ss at tt
Et(s,a)E_t(s,a) eligibility trace for a state-action pair
et\bold{e}_t eligibility trace vector at tt
γ\gamma discount rate parameter
ε\varepsilon probability of random action in ε\varepsilon-greedy policy
α,β\alpha , \beta step-size parameters
λ\lambda decay-rate parameter for eligibility traces

Chapter 1: The Reinforcement Learning Problem

1.1 Reinfrocement Learning

Reinfocement learning is different from supervised learning, the kind of learning studied in most current reserch in the field of machine learning. Supervised learning is learning from a training set of labeled examples provided by a knowledgable external supervisor. Each example is a description of a situation together with a specification—the label—of the correct action the system should take to that situation, which is often to identify a category to which the situation belongs. The object of this kind of learning is for the system to extrapolate, or generalize, its responses so that it acts correctly in situations not present in the training set.

Whereas reinforcement learning relies on interaction between an agent and the environment, supervised learning which utilizes the "omniscient" training data set.

Although one might be tempted to think of reinforcement learning as a kind of unsupervised learning because it does not rely on examples of correct behavior, reinforcement learning is trying to maximize a reward signal instead of trying to find hidden structure.

Reinforcement learning exists outside the dual paradigms of supervision in part due to the inherent trade-off between exploration and exploitation. In order to discover optimal actions (exploration), the agent must forego performing known actions and risk taking an unknown action.

The agent has to exploit what it already knows in order to obtain reward, but it also has to explore in order to make better action selections in the future

1.2 Examples

  • A gazelle calf struggles to its feet minutes after being born. Half an hour later it is running at 20 miles per hour.

In all of the exmaples given, the agent's actions affect the future state of the environment in an unknown, but predictable way.

Correct choice requires taking into account indirect, delayed consequences of actions, and thus may require foresight or planning.

1.3 Elements of Reinforcement Learning

Reinforcement learning can be chategorized by four main subelements (with main elements of agent, environment):

  • policy - defines the agent's behaior. Can be considered as a mapping from percieved states of the environment to actions to be taken when in those states.
  • reqard signal - defines the goal of the RL problem as the agent's purpose is to maximize reward
  • value function - whereas the reward signal indicates what is good in an immediate sense, a value function specifies what is good in the long run by accounting for the reward gained from states that are likely to follow from an action.
  • model of environment - mimics the behavior of the environment, allowing inferences to be made about how the environment will behave.

    • model-based - methods that rely on models (duh) and planning
    • model-free - explicit trial-and-error learners --> anti-planning

1.4 Limitations and Scope

While this book focuses on valu-estimate functions as a core component of the algorithms discussed, alternative methods such as genetic algorithms and programming, simulated annealing, and other optimization methods have proven to be succcessful as well.

If action spaces are sufficiently small, or good policies are common, then these evolutionary approaches can be effective. However, methods that can exploit the details of individual behavioral interacitons can be more efficient than the evolutionary methods listed above.

Some methods do not appeal to value functions, but merely search the policy spaces defined by a collection of numerical parameters, estimating the directions they need to tuned towards to most rapidly improve a policy's performance. Policy gradients like this have proven useful in many cases.

1.5 An Extended Example Tic-Tac-Toe

Consider a game of tic-tac-toe against an imperfect player whoe play is sometimes incurrect and allows us to win. Whereas classical game theory techniques such as minimax offer solutions to intelligent/perfect opponents, they may fail in situations where they were not already disposed to win.

Classical optimization methods for sequential decision problems, such as dynamic programming, can compute an optimal solution for any opponent, but require as input a complete specification of that opponent, including the probabilities with which the opponent makes each move in each board state

An RL approach using a value function might make use of a table of numbers associated with each possible state in the game. Each number will be the latest estimate of the state's value, and the whole tabled is the learned value function. State A is said to be better than state B if the current estimate of the probability of our winning from A is higher than it is from B.

Assuming we always play Xs, then for all states with three Xs in a row the probability of winning is 1, because we have already won. Similarly, for all states with three Os in a row, or that are “filled up,” the correct probability is 0, as we cannot win from them. We set the initial values of all the other states to 0.5, representing a guess that we have a 50% chance of winning.

We play many games against the opponent. To select our moves we examine the states that would result from each of our possible moves (one for each blank space on the board) and look up their current values in the table. Most of the time we move greedily, selecting the move that leads to the state with greatest value, that is, with the highest estimated probability of winning. Occasionally, however, we select randomly from among the other moves instead. These are called exploratory moves because they cause us to experience states that we might otherwise never see.

Throughout the "playing" process, we update the values of the states we actually encounter from their initialized value of 0.5 in order to make our value estimates more accurate. To do this, we back up the current value of the earlier state to be closer to the value of the later state:

V(s)V(S)+α[V(s)V(s)]V(s) \leftarrow V(S) + \alpha [V(s') - V(s)]

s,s,α=state before greedy move, state after greedy move, step-size parameters,s', \alpha = \text{state before greedy move, state after greedy move, step-size parameter}

If the step-size parameter is reduced properly over time, this method converges, for any fixed opponent. If the step-size parameter is not reduced all the way to zero over time, then the agent also plays well against opponenets that slowly change their strategy.

Evolutionary methods struggle to retain association between which actions caused positive reward, equally weighting all actions that contriubted to a "win". In contrast, value functions evaluate individual states. Although both methods search the policy space, learning the value function takes advantage of the information available.

By adding a neural network to the tabular representation of the value-function, the agent can generalize from it's experiences so that it selects action based on information fomr similar stated experienced in the past. Here, supervised learning methods can helpout, although neural nets are neither the only or best way to transcend tabularization.

The tic-tac-toe example agent is model-free in this sense w.r.t its opponent: it has no model of its opponent. However, this can be advantageous as it avoids complex method in which bottlenecks arise from constructing a sufficiently accurate environment model.

1.6 Summary

RL is the first field to seriously address the computational issues that arise when learning from interaction in order to achiever long-term goals. RL's use of value functions distinguishes reinforcement learning methods from evolutionary methods that search directly in policy space guided by scalar evaluations of entire policies.

Chapter 2: Multi-arm Bandits

RL is an evaluation oriented approach which retroactively improves rather than prooactively instruct. Evaluative feedback depends on the actions taken, and instructive feedback is independent of the action. To study the evaluative aspect, we will work in a nonassociative setting which reduces the complexity of the RL problem to highlight the former topic: the n-armed bandit problem.

2.1 An nn-Armed Bandit Problem

When repeatedly faced with nn different actions, after which the agent is rewarded from a stationary action-dependent probability distribution, how should you maximize expected total reward over some time period, say 1,000 time-steps. Each action has an estimated expected reward, called the value of that action.

If the agent prioritizes the action associated with the highest estimated value, this is called a greedy action resulting from exploiting the current knowledge of action-value pairs.

Choosing a non-greedy action for the sake of broadening exploitable knowledge is called exploration.

Exploitation is the right thing to do to maximize the expected reward on the one step, but exploration may produce the greater total reward in the long run ... Reward is lower in the short run, during exploration, but higher in the long run because after you have discovered the better actions, you can exploit them many times.

2.2 Action-Value Methods

In this chapter, the true value of action aa is denoted q(a)q(a), and the estimated value on the tt-th time-step is Qt(a)Q_t(a). An intuitive estimation is the average rewards actually received when an action has been selection.

In other words, if by the tt-th time step action a has been chosen Nt(a)N_t(a) times prior to tt, yielding rewards R1,R2,...,RNt(a)R_1, R_2, . . . , R_{N_t}(a) , then its value is estimated to be

Qt(a)={R1+R2+...+RNt(a)Nt(a)if Nt(a)>00;o.w.Q_t(a) = \begin{cases} \frac{R_1 + R_2 + ... + R_{N_t}(a)}{N_t(a)} &\text{if } N_t(a) > 0 \\ 0; &\text{o.w.} \end{cases}

Note that as limNt(a)Qt(a)=q(a)\lim\limits_{N_t(a) \to \infty} Q_t(a) = q(a) which is called the sample-average method for estimating action values as each estimate is the simple average o the sample of relevant rewards.

The simplest action selection rule is to select the action (or one of the actions) with highest estimated action value, that is, to select at step tt one of the greedy actions, AtA^*_t, for which Qt(At)=maxaQt(a)Q_t(A^*_t) = \max \limits_{a} Q_t(a). This greedy actionselection method can be written as

At=argmaxaQt(a)A_t = \arg \max \limits_{a} Q_t(a)

Greedy action selection always exploits current knowledge to maximize immediate reward spending no time sampling inferior actions. One solution to the exploration-exploitation conflict is ε\varepsilon-greedy exploration which is taking a random action with small probability ε\varepsilon instead of the exploitative action. ε\varepsilon-greedy methods are advantageous as, since each action has equal probability of being randomly selected, each action will be sampled an infinite number of times, guaranteeing Nt(a),aN_t(a) \to \infty, \forall a s.t. Qt(a)Q_t(a) converges to q(a)q(a)

Tests against an arbitrary 10-armed-bandit problem show that ε[0.01,0.1]\varepsilon \in [0.01, 0.1] is a good general hyper parameter for ε\varepsilon-greedy exploration with trade offs between optimal-action discovery sooner vs better long-term performance.

It is also possible to reduce ε\varepsilon over time to try to get the best of both high and low values.

2.3 Incremental Implementation

The problem with the straightforward estimatation of the value of an action as described in 2.1 is that it become memory and computationally intensive without bound over time. Each additional reward following an action requires more memory to store in order to determine Qt(a)Q_t(a). To fix, let QkQ_k deonte the estimate for an agent's kk-th reward, that is the average of its first k1k-1 rewards. The average of all kk rewards is given by:

Qk+1=1ki=1kRi=1k(Rk+i=1k1Ri)=1k(Rk+(k1)Qk+QkQk)=1k(Rk+kQkQk)=Qk+1k[RkQk],\begin{aligned} Q_{k+1} &= \frac{1}{k} \displaystyle\sum_{i=1}^k R_i \\ & = \frac{1}{k} \Big( R_k + \displaystyle\sum_{i=1}^{k-1} R_i \Big) \\ & = \frac{1}{k} \Big( R_k + (k-1) Q_k + Q_k - Q_k \Big) \\ & = \frac{1}{k} \Big( R_k + kQ_k - Q_k \Big) \\ & = Q_k + \frac{1}{k} \Big[ R_k - Q_k \Big], \end{aligned}

which only requires memory for Qk,kQ_k, k, and minimaly computation for each new reward.

The update rule is a form that occurs frequently throughout this textbook (foreshadowing the Bellman) whose general form is:

NewEstimateOldEstimate+StepSize[TargetOldEstimate]error estimateNewEstimate \leftarrow OldEstimate + StepSize \underbrace{[Target - OldEstimate]}_{\text{error estimate}}

The error estimate\text{error estimate} is reduced by taking steps towards the TargetTarget which indicates a desirable direction to move, e.g. the kk-th reward. Note that the StepSizeStepSize used in the incremental method above changes from time-step to time-step according the the parameter αt(a)α=1k\alpha_t(a) \leftarrow \alpha = \frac{1}{k}

2.4 Tracking a Nonstationary Problem

In cases where the environment is nonstationary and the "bandit" is changing over time, it makes sense to weight recent rwards more heavily than long-past ones. By using a constant step-size parameter, and modifying the incremental update rule from 2.3, we can achieve this effect:

Qk+1=Qk+α[RkQk]Q_{k+1} = Q_k + \alpha \big[R_k - Q_k \big]

where α(0,1]1\alpha \in (0,1]^1 is constant s.t. Qk+1Q_{k+1} is a weighted average of past rewards and the initial estimate Q1Q_1:

Qk+1=Qk+α[RkQk]=αRk+(1α)Qk=αRk+(1α)[αRk1+(1α)Qk1]=αRk+(1α)αRk1+(1α)2Qk1=αRk+(1α)αRk1+(1α)2Qk2+...+(1α)k1αR1+(1α)kQ1=(1α)Q1+i=1kα(1α)kiRi.\begin{aligned} Q_{k+1} &= Q_k + \alpha \big[R_k - Q_k \big] \\ &= \alpha R_k + (1 - \alpha) Q_k \\ &= \alpha R_k + (1 - \alpha)[\alpha R_{k-1} + (1 - \alpha) Q_{k-1}] \\ &= \alpha R_k + (1 - \alpha)\alpha R_{k-1} + (1 - \alpha)^2 Q_{k-1} \\ &= \alpha R_k + (1 - \alpha)\alpha R_{k-1} + (1 - \alpha)^2 Q_{k-2} + ... + (1 - \alpha)^{k-1} \alpha R_1 + (1-\alpha)^kQ_1 \\ &= (1-\alpha)Q_1 + \displaystyle\sum_{i=1}^k \alpha(1- \alpha)^{k-i}R_i. \end{aligned}

This is the weighted average sum where (1α)Q1+i=1k=1(1-\alpha)Q_1 + \displaystyle\sum_{i=1}^k = 1. Note that because of exponential, recency-weighted average, if 1α=01-\alpha=0, then all the weight goes to the last reward.

Sometimes it is convenient to vary the step-size parameter from step to step. Let αk(a)\alpha_k(a) denote the step-size parameter used to process the reward received after the kk-th selection of action aa, where αk(a)=1k\alpha_k(a) = \frac{1}{k} is the sample-average method which is guaranteed to converge to the true action values. But, convergence is not guaranteed for all choices of the sequence {αk(a)}\{\alpha_k(a)\}. Per stochastic approximation theory, the conditions to assure convergence with probability 1 are given by:

k=1αk(a)=\displaystyle\sum^\infty_{k=1} \alpha_k(a) = \infty and k=1αk2(a)\displaystyle\sum^\infty_{k=1} \alpha^2_k(a) \infty

The first condition guarantees that steps are large enough to eventually overcome any initial conditions or random fluctuations and the second guarantees that they eventually become small enough to assure convergence. Note that both conditions are met for the sample-average case, but not for the case of constant step-size paramter.

2.5 Optimistic Initial Values

All the methods discussed above are to some degree dependent on or biased towards the initial action-value estimates Q1(a)Q_1(a). For sample-average methods, the bias disappears once all action have been selected at least once, but constant-α\alpha methods retain permanent bias. Optimistic initial action values encourage exploration as most actions perform worse than the initial value, causing exploitative actions to attempt the other faux optimistic actions before beginning true exploration. At first, these methods tend to perform worse as they are mor exploratory, but rapidly perform better as the need for exploration is resolved sooner.

However, such and approach is not effective in nonstationary problems as the drive for exploration is inherently temporary.

If the task changes, creating a renewed need for exploration, this method cannot help ... The beginning of time occurs only once, and thus we should not focus on it too much.

2.6 Upper-Confidence-Bound Action Selection

Exploration is needed while estimates of action values are uncertain. ε\varepsilon-greedy action selection force non-actions to be tried indiscriminately, with no prference for those that are nearly greedy or particularly uncertain.

It would be better to select among the non-greedy actions according to their potential for actually being optimal, taking into account both how close their estimates are to being maximal and the uncertainties in those estimates. One effective way of doing this is to select actions as:

At=argmaxa[Qt(a)+clntNt(a)],A_t = \arg \max\limits_{a} \Big[Q_t(a) + c \sqrt{\frac{\ln{t}}{N_t(a)}} \Big ],

where c>0c > 0 controls the degree of exploration and for Nt(a)=0N_t(a)=0, aa is considered a maximizing action.

The idea of this upper confidence bound (UCB) action selection is that the square-root term is a measure of the uncertainty or variance in the estimate of aa’s value. Therefore, the quantity being max\max'ed over is a sort of upport bound on the possible true valie of action aa, with the cc parameter determining the confidence level. Each time aa is selected, the uncertainty is presumably reduced; Nt(a)N_t(a) i incremented, and the term is square root decreased.

Another difficulty is dealing with large state spaces, ... In these more advanced settings there is currently no known practical way of utilizing the idea of UCB action selection.

2.7 Gradient Bandits

Another approach is learning a numerical preference Ht(a)H_t(a) for each aa. While the preference indicates the frequency of an action being taken, it has no interpretation in terms of reward. Only relative prefence of one action over another is considered e.g. if we add an arbitrary, but equal amount to all the pereferences, there is no affect on the action probabilities which are determine according to a soft-max (or Gibbs, Boltzmann) distribution:

Pr{At=a}=eHt(a)bn=1eHt(b)=πt(a)\text{Pr} \{A_t = a\} =\frac{e^{H_t(a)}}{\sum^n_b=1 e^{H_t(b)}} = \pi_t(a), where initially, all preferences are the same (H1(a)=0,aH_1(a) = 0, \forall a) so that all action have an initial equal probability of being selected.

The application in stochastic gradient ascent is, after selecting the action AtA_t and receiving reward RtR_t, the preferences are updated by:

Ht+1(At)=Ht(At)+α(RtRtˉ)(1πt(At))H_{t+1}(A_t) = H_t(A_t) + \alpha (R_t - \bar{R_t})(1-\pi_t(A_t))


Ht+1(a)=Ht(a)α(RtRtˉ)πt(a),aAtH_{t+1}(a) = H_t(a) - \alpha (R_t - \bar{R_t})\pi_t(a), \forall a \neq A_t,

where α>0\alpha > 0 is the step-size paramer, and RtˉR\bar{R_t} \in \R is the average of all the rewards up through and including tt which can be computed incrementall (2.3, 2.4 for stationary and nonstationary problems, respectively). Rtˉ\bar{R_t} is the benchmark reward against which each reward is compared. The probability of taking AtA_t is increased/decreased relative to it's difference with the benchmark. Non-selected actions move in the opposite direction.

Deeper insight can be gained by understanding it as a stochastic approximation to gradient ascent. In exact gradient ascent, each preference Ht(a)H_t(a) would be incrementing proportional to the increments effect on performance:

Ht+1(a)=Ht(a)+αE[Rt]Ht(a),H_{t+1}(a) = H_t(a) + \alpha \frac{\partial \mathbb{E}[R_t] }{\partial H_t(a)}, where the measure of the performance here is the expected reward:

E[Rt]=tπt(b)q(b).\mathbb{E}[R_t] = \displaystyle\sum_t \pi_t(b)q(b).

While it's not possible it implement gradient ascent exactly as we do not know the q(b)q(b), the updates using the preference updates are equal to the above equation in expected value, making the algorithm an instance of stochastic gradient ascent. This can be observed by:

E[Rt]=Ht(a)[bπt(b)q(b)]=bq(b)πt(b)Ht(a)=b(q(b)Xt)πt(b)Ht(a),\begin{aligned} \partial \mathbb{E}[R_t] &= \frac{\partial}{\partial H_t(a)} \Bigg[ \displaystyle\sum_b \pi_t(b)q(b) \Bigg]\\ &= \displaystyle\sum_b q(b) \frac{\partial \pi_t(b)}{\partial H_t(a)} \\ &= \displaystyle\sum_b (q(b) - X_t) \frac{\partial \pi_t(b)}{\partial H_t(a)}, \end{aligned}

where XtX_t can be any scalar independent of bb. Here, the graident sums to zero over all the actions:

bπt(b)Ht(a)=0\sum_b \frac{\partial \pi_t(b)}{\partial H_t(a)} = 0

As Ht(a)H_t(a) varies, some actions' probabilities go up, others down, s.t. the net change = 0 as the sum of the probabilities must remain equal to 1:

=bπt(b)(q(b)Xt)πt(b)Ht(a)πt(b)= \displaystyle\sum_b \pi_t(b)(q(b)- X_t) \frac{\frac{\partial \pi_t(b)}{\partial H_t(a)}}{\pi_t(b)}

which is now in the form of an expectation summed over all possible values bb of the random variable AtA_t:

=E[(q(At)Xt)πt(At)Ht(a)/πt(At)]=E[(RtRtˉ)πt(At)Ht(a)/πt(At)],\begin{aligned} = \mathbb{E}\Bigg[ (q(A_t) - X_t) \frac{\partial \pi_t(A_t)}{\partial H_t(a)} / \pi_t(A_t) \Bigg] \\ = \mathbb{E}\Bigg[ (R_t - \bar{R_t}) \frac{\partial \pi_t(A_t)}{\partial H_t(a)} / \pi_t(A_t) \Bigg], \end{aligned}

where we've chosen Xt=RtˉX_t = \bar{R_t} and substituted RtR_t for q(At)q(A_t), which is permitted as E[Rt]=q(At)\mathbb{E}[R_t] = q(A_t) and all other factors are non random. Shortly we'll establish that πt(At)Ht(a)=πt(b)(Ia=bπt(a))\frac{\partial \pi_t(A_t)}{\partial H_t(a)} = \pi_t(b)(\mathbb{I}_{a=b} - \pi_t(a)) where

Ia=b{1if a=b0o.w.\mathbb{I}_{a=b} \begin{cases} 1 &\text{if } a = b \\ 0 &\text{o.w.} \end{cases}

Which means that we now have:

=E[(RtRtˉ)πt(At)(Ia=Atπt(a))πt(At)]=E[(RtRtˉ)(Ia=Atπt(a))].\begin{aligned} &= \mathbb{E} [ (R_t - \bar{R_t}) \pi_t(A_t)(\mathbb{I}_{a=A_t} - \pi_t(a)) \pi_t(A_t) \big] \\ &= \mathbb{E} [ (R_t - \bar{R_t}) (\mathbb{I}_{a=A_t} - \pi_t(a)) \big]. \end{aligned}

With the intention of writing the performance gradient as an expectation of soething that can be sampled at each step, and the updated on each step proportional to the sameple, we can substitute the above expectation for the performance gradient which yields:

Ht+1(1)=Ht(a)+α(RtRtˉ)(Ia=Atπt(a)),aH_{t+1}(1) = H_t(a) + \alpha (R_t - \bar{R_t})( \mathbb{I}_{a=A_t}-\pi_t(a)), \quad \forall a

which is equivalent to the original algorithm.

After proving that πt(b)Ht(a)=πt(b)(Ia=bπt(a))\frac{\partial \pi_t(b)}{\partial H_t(a)} = \pi_t(b)(\mathbb{I}_{a=b} - \pi_t(a)), then we can show that the expected update of the gradient-bandit algorithm is equal to the gradient of the expected reward, and thus the algorithm is an instance of stochastic gradient ascent which in turn assures robust convergence properties.

Note that this is independent of the selected action ... The choice of the baseline does not affect the expected update of the algorithm, but it does affect the variance of the update and thus the rate of convergence

2.8 Associative Search (Contextual Bandits)

When there are different actions that need to be associated with different situation, a policy –that is, a mapping from situations to the actions that are best in those situations– needs to be learned.

Suppose there are several differen nn-armed bandit tasks and that on each play one of these different tasks is confronted at random. Unless you randomly select the true action value for the given task, this method will. Suppose, however, that when the bandit task is selected against your agent, you are given a distinct clue about its identity (but, importantly, not its action values).

2.9 Summary

  • ε-greedy methods choose randomly a small fraction of the time,
  • UCB methods choose deterministically but achieve exploration by subtly favoring at each step the actions that have so far received fewer samples.
  • Gradient-bandit algorithms estimate not action values, but action preferences, and favor the more preferred actions in a graded, probabalistic manner using a soft-max distribution.

The simple expedient of initializing estimates optimistically causes even greedy methods to explore significantly.

While UCB appears to perform best in the nn-bandit scenario, also note that each of the algorithms are fairly insensitive to their relevant hyperparemters. Further sophisticated means of balancing the exploration-exploitation conflict are discussed here.

Source Code

Chapter 3: Finite Markov Decision Processes

This chapter broadly characterizes the RL problem, presenting the idealized mathematical representation therein. Gathering insights from the mathematical structure, they introduce discussion of value functions and Bellman equations.

3.1 The Agent-Environment Interface

The learner and decision-maker is called the agent. The thing it interacts with, comprising everything outside the agent, is called the environment. These interact continually, the agent selecting actions and the environment responding to those actions and presenting new situations to the agent.

The agent interacts with the environment at each of the the discrete time steps, t=0,1,2,3,...t = 0,1,2,3,..., with the agent receiving some representation of the environment's state StSS_t \in \mathcal{S}, where S\mathcal S is the set of possible states, and on that basis selects an action AtA(St)A_t \in \mathcal{A}(S_t), where A(St)\mathcal{A}(S_t) is the set of actions available in state StS_t. After each action is taken (that is, 1 time step later), the agent receives reward Rt+1RRR_{t+1} \in \mathcal{R} \subset \mathbb{R}, and enters St+1S_{t+1}.

At each step, the agent develops its mapping from states to probabilities of selection each available action called it's policy πt(as)\pi_t(a | s), (where At=a,St=sA_t = a, S_t = s), which represents a flexible and abstract framework that can be applied to a wide range of problems.

the boundary between agent and environment is not often the same as the physical boundary of a robot’s or animal’s body. Usually, the boundary is drawn closer to the agent than that ... The general rule we follow is that anything that cannot be changed arbitrarily by the agent is considered to be outside of it and thus part of its environment.

3.2 Goals and Rewards

In RL, the goal of the agent is formalized in terms of the reward function, where it attempts to maximize cumulative reward in the long run. It it critical to model success in such a way that indicates what we want to be accomplished: what not how. Rewards are computed in/by the environment, not the agent. This is important to maintain imperfect control so that the agent has to meaningfully interact with the environment rather than simply confer reward upon itself.

3.3 Returns

How do we formalize cumulative reward for maximization? If the sequence of rewards awarded after time step tt is deonted Rt+1,Rt+2,Rt+3,...R_{t+1}, R_{t+2}, R_{t+3}, ..., then we can maximize the expected return Gt=Rt+1+Rt+2+...+RTG_t = R_{t+1} + R_{t+2} + ... + R_T, where TT is the final time step. This works for envornments with terminal states at the end of each episode followed by a reset to a standard starting state.

In episodic tasks we sometimes need to distinguish the set of all nonterminal states, denoted S\mathcal S, from the set of all states plus the terminal state, denoted S+\mathcal S^+.

In some cases, agent-environment interaction is not episodically divided; rather it is continuous and without limit. In these cases, it's unsuitable to use GtG_t as presented above as T=T = \infty, and return itself could be infinite (e.g. cart-pole). To fix this issue, we use discounting so that the agent tries to maxmimize the sum of discounted rewards ad-infinitum:

Gt=Rt+1+γRt+2+γRt+3+...=k=0γkRt+k+1G_t = R_{t+1} + \gamma R_{t+2} + \gamma R_{t+3} + ... = \displaystyle\sum^\infty_{k=0} \gamma ^k R_{t+k+1} where 0γ10 \leq \gamma \leq 1, and is called the discount rate.

Gamma controls how near/faresighted the agent is.

If γ<1\gamma < 1, the infinite sum has a finite value as long as the reward sequence {Rk}\{R_k\} is bounded. If γ=1\gamma = 1, the agent is “myopic” in being concerned only with maximizing immediate rewards: its objective in this case is to learn how to choose AtA_t so as to maximize only Rt+1R_{t+1}.

3.4 Unifed Notation for Episodic and Continuing Tasks

{A,R,π,T,etc.}t,i\{A, R, \pi, T, etc.\}_{t,i} refer to the the representation of a variable at time tt of episode ii. Additionally, the sum over a finite and infinite number of terms can be unified by considering the terminal step to be an absorbing state which transition only to itself and generates zero reward.

So, Gt=k=0Tt1γkRt+k+1G_t = \displaystyle\sum^{T-t-1}_{k=0} \gamma ^k R_{t+k+1} which includes the possibility of T=T = \infty or γ=1\gamma = 1, but not both.

3.5 The Markov Property

Certainly the state signal should include immediate sensations such as sensory measurements, but it can contain much more than that. State representations can be highly processed versions of original sensations, or they can be complex structures built up over time from the sequence of sensations ... On the other hand, the state signal should not be expected to inform the agent of everything about the environment, or even everything that would be useful to it in making decisions.

A state signal that succeeds in retaining all relevant information is said to be Markov, meaning that it summarizes everything about the complete sequence of positions (transition dynamics: SARSA) that led to it.

In the most general, discrete case, the necessary response may depend on everything that has happened earlier and can be definied as the complete probablity distribution:

P(Rt+1=r,St+1=sS0,A0,R1,...,St1,At1,Rt,St,At)P(R_{t+1} = r, S_{t+1} = s' | S_0, A_0, R_1, ... , S_{t-1}, A_{t-1}, R_t, S_t, A_t)

If a state signal is Markov, i.e. the environment's response depends only on the state and action representations of the current time step, then the dynamics can be defined by: (s,rs,a)(s', r | s, a). This, in turn, allows the agent to predict all future states and expected rewards from merely the given state.

Even if a state is non-Markov, it is useful to treat it as such, as the current state is always the fundemental basis for predicting future rewards which influence action selection.

The inability to have access to a perfect Markov state representation is probably not a severe problem for a reinforcement learning agent.

3.6 Markov Decision Processes

An RL task that satisfies the MArov property is called an MDP. If the state and action spaces are finite, then it is call a finite MDP.

Given the dynamics specified by p(s,rs,a)p(s', r | s, a), the agent can computer anything else it needs to know about the environment:

  • Expected rewards for state-action pairs:

r(s,a)=E[Rt+1St=s,At=a]=rRrsSp(s,rs,a)\qquad \qquad r(s,a) = \mathbb{E}[R_{t+1} | S_t=s, A_t=a] = \displaystyle\sum_{r \in \mathcal{R}}r \displaystyle\sum_{s' \in \mathcal{S}} p(s', r | s, a),

  • State-transition probabilities:

p(ss,a)=rRp(s,rs,a)\qquad \qquad p(s' | s, a) = \displaystyle\sum_{r \in \mathcal{R}} p(s', r| s, a)

  • Expected reward for the state-action-next triples:

r(s,a,s)=E[Rt+1St=s,At=a,St+1=s]=rRrp(s,rs,a)p(ss,a)\qquad \qquad r(s, a, s') = \mathbb{E}[R_{t+1} | S_t=s, A_t=a, S_{t+1} = s'] = \frac{\sum_{r \in \mathcal{R}}r p (s', r | s, a)}{p(s' | s, a)}

3.7 Value Functions

A Value function estimates how good it is to be in a given state, or how good it is to perform a given action in a given state, defined in terms of expected reward. The value of a state ss under a policy π\pi: vπ(s)v_\pi(s), is the expected return when starting in s, and following pi thereafter. More formally:

vπ(s)=E[GtSt=s]=Eπ[k=0γkRt+k+1St=s]v_\pi(s) = \mathbb{E} [G_t | S_t = s] = \mathbb{E}_\pi \Bigg[ \displaystyle\sum_{k=0}^\infty \gamma^k R_{t+k+1} \Big \vert S_t = s \Bigg].

Similarly, the value of taking action aa in state ss under policy π\pi, denoted qπ(s,a)q_\pi(s,a) is defined the expected return starting from ss, taking action aa, and therefter following π\pi:

qπ(s,a)=E[GtSt=s,At=a]=Eπ[k=0γkRt+k+1St=s,At=a]q_\pi(s,a) = \mathbb{E} [G_t | S_t = s, A_t = a] = \mathbb{E}_\pi \Bigg[ \displaystyle\sum_{k=0}^\infty \gamma^k R_{t+k+1} \Big \vert S_t = s, A_t = a \Bigg ].

qπq_\pi is call the action-value (quality) function for policy π\pi. Both of these functions can be estimated with sufficient experience. Estimation of qπ,vπq_\pi, v_\pi as the number of times each state is encountered approaches infinity is called a Monte Carlo method and involve averaging over many random samples of actual returns.

For any policy π and any state s, the following consistency condition holds between the value of s and the value of its possible successor states:

vπ(s)=E[GtSt=s]=Eπ[k=0γkRt+k+1St=s]=Eπ[Rt+1+γk=0γkRt+k+2St=s]=aπ(as)srp(s,r,s,a)[r+γE[k=0γkRt+k+2St+1=s]]=aπ(as)s,rp(s,rs,a)[r+γvπ(s)],\begin{aligned} v_\pi(s) &= \mathbb{E} [G_t | S_t = s] \\ &= \mathbb{E}_\pi \Bigg[ \displaystyle\sum_{k=0}^\infty \gamma^k R_{t+k+1} \Big \vert S_t = s \Bigg] \\ &= \mathbb{E}_\pi \Bigg[ R_{t+1} + \gamma \displaystyle\sum_{k=0}^\infty \gamma^k R_{t+k+2} \Big \vert S_t = s \Bigg] \\ &= \displaystyle\sum_a \pi(a | s) \displaystyle\sum_{s'} \displaystyle\sum_{r} p(s', r, | s, a) \Bigg[r + \gamma \mathbb{E} \Bigg[ \displaystyle\sum_{k=0}^\infty \gamma^k R_{t+k+2} \Big | S_{t+1}=s' \Bigg] \Bigg] \\ &= \displaystyle\sum_a \pi(a | s) \displaystyle\sum_{s',r} p(s', r |s, a) \Big[r + \gamma v_\pi(s') \Big], \end{aligned}

[Which is ~simply~] a sum over all values of the three variables, a,s,ra, s', r. For each triple, we compute its probability, π(as)p(s,rs,a)\pi(a|s)p(s', r|s, a), weight the quantity in brackets bythat probability, then sum over all possibilities to get an expected value. This is the Bellman equation with vπv_\pi as the solution.

3.8 Optimal Value Functions

Because value functions define a partial ordering over policies, we can precisely define the optimal policy for a finite MDP. A policy is defined to be better than or equal to a policy π\pi' if its expected return is greater than or equal to that of π\pi' for all states: ππ    vπ(s)vπsS\pi \geq \pi' \iff v_\pi(s) \geq v_{\pi'} \quad \forall s \in \mathcal S. The optimal policy π\pi^* is one (or more) policies that is better than or equal to all other policies and is defined by:

v(s)=maxπvπ(s)sSv^*(s) = \max \limits_{\pi} v_\pi(s) \quad \forall s \in \mathcal S

Optimal policies also share the same optimal quality function:

q(s,a)=maxπqπ(s,a)s,aS,A(s)q^*(s,a) = \max \limits_{\pi} q_\pi(s,a) \quad \forall s,a \in \mathcal {S, A(s)}

This function gives the expected return for taking action aa in state ss and thereafter following an optimal policy. Thus, we can write qq^* in terms of vv^*:

q(s,a)=E[Rt+1+γv(St+1St=a,At=a)]q^*(s,a) = \mathbb E [R_{t+1} + \gamma v^*(S_{t+1} | S_t =a, A_t =a)].

Because vv^* is the value function for a policy, it must satisfy the self-consistency condition given by the Bellman equation for state values. The Bellman optimality equation expresses the fact that the vlaue of a state under an optimal policy must equal the expected return for the best action from that state:

v(s)=maxaA(s)Eπ[GtSt=s,At=a]=maxaA(s)Eπ[k=0γkRt+k+1Stt=s,At=a]=maxaA(s)Eπ[Rt+1+γk=0γkRt+k+2Stt=s,At=a]=maxaE[Rt+1+γv(St+1)St=s,At=a]=maxaA(s)s,rp(s,rs,a)[r+γv(s)]\begin{aligned} v^*(s) &= \max \limits_{a \in \mathcal{A(s)}} \mathbb{E}_{\pi^*} [ G_t | S_t = s, A_t = a] \\ &= \max \limits_{a \in \mathcal{A(s)}} \mathbb{E}_{\pi^*} \Bigg[ \displaystyle\sum_{k=0}^\infty \gamma^k R_{t+k+1} \Bigg | St_t = s, A_t = a \Bigg] \\ &= \max \limits_{a \in \mathcal{A(s)}} \mathbb{E}_{\pi^*} \Bigg[ R_{t+1} + \gamma \displaystyle\sum_{k=0}^\infty \gamma^k R_{t+k+2} \Bigg | St_t = s, A_t = a \Bigg] \\ &= \max \limits_{a} \mathbb{E} [R_{t+1} + \gamma v^*(S_{t+1}) | S_t = s, A_t = a] \\ &= \max \limits_{a \in \mathcal{A(s)}} \displaystyle\sum_{s', r} p(s', r | s, a)[r + \gamma v^*(s')] \end{aligned}

Similarly, the Bellman optimality equation for qq^* is:

q(s,a)=E[Rt+1+γmaxaq(St+1,a)St=s,At=a]=s,rp(s,rs,a)[r+γmaxaq(s,a)].\begin{aligned} q^*(s,a ) &= \mathbb E \Big[ R_{t+1} + \gamma \max \limits_{a'} q^*(S_{t+1}, a') \Big | S_t=s, A_t = a \Big] \\ &= \displaystyle\sum_{s', r} p(s', r |s, a)[r + \gamma \max \limits_{a'} q^*(s', a')]. \end{aligned}

For finite MDPs, the Bellman optimality equation has a unique solution independent of policy. It can be expanded to a system of equations, one for each of the NN states, implying NN equations in NN unknowns.

3.9 Optimality and Approximation

The fact of the matter is that an agent rarely learns the optimal policy, only at the expense of extreme computation cost.

even if we have a complete and accurate model of the environment’s dynamics, it is usually not possible to simply compute an optimal policy by solving the Bellman optimality equation. E.g. Chess where an agent's information is perfect and complete, but the computation cost for look ahead past a few time steps is far too large. Memory is also a constraint when building up approximations of value functions, policies, and models..

However, it also presents us with some unique opportunities for achieving useful approximations. For example, in approximating optimal behavior, there may be many states that the agent faces with such a low probability that selecting suboptimal actions for them has little impact on the amount of reward the agent receives.

3.10 Summary

The RL agent and its environment interact over a sequence of discrete time steps, via actions taken in states, earning rewards.

A policy is a stochastic rule by which the agent selects actions as a function of states geared towards maximizing rewards over time.

The return is the function of future rewards that the agent seeks to maximize. Undiscounted formulation is approprieate for episodic tasks, otherwise –in continuing taksks–, it is necessary for convergence.

An environment satisfies the Markov property if the state signal summarizes the past with the ability to predict the future.

A policy's value functions assign to each state, or state-action pair, the expected return from that state or state-action pair under the given policy. Optimal value functions assign to each state or state-action pair the largest expected return achievable under the policy.

Chapter 4: Dynamic Programming

Dynamic Programming (DP) referese to a collection of algorithms that can be used to compute optimal policies given a perfect model of the environment as an MDP. Classical DP algorithms are limited in their utility due to their assumption of perfect models and therefore computational expense, but they still offer theoretical value.

Assume the environment is a finite MDP, that state, action, and reward sets are finite and defined by p(s,rs,a)s,a,r,sS,A(s),R,S+p(s', r |s, a) \quad \forall s, a, r, s' \in \mathcal{S, A(s), R, S^+}

The key idea of DP is to use value functions to organize and structure the search for good, optimal policies. As mentioned in chapter 3, optimal policies can be easily attained once either v,qv^*, q^* are known:

v(s)=maxaE[Rt+1+γv(St+1)St=s,At=a]=maxas,rp(s,rs,a)[r+γv(s)]\begin{aligned} v^*(s) &= \max \limits_{a} \mathbb{E} [R_{t+1} + \gamma v^*(S_{t+1}) | S_t = s, A_t = a] \\ &= \max \limits_{a} \displaystyle\sum_{s', r} p(s', r | s, a)[r + \gamma v^*(s')] \\ \end{aligned}


q(s,a)=E[Rt+1+γmaxaq(St+1,a)St=s,At=a]=s,rp(s,rs,a)[r+γmaxaq(s,a)].\begin{aligned} q^*(s,a ) &= \mathbb E \Big[ R_{t+1} + \gamma \max \limits_{a'} q^*(S_{t+1}, a') \Big | S_t=s, A_t = a \Big] \\ &= \displaystyle\sum_{s', r} p(s', r |s, a)[r + \gamma \max \limits_{a'} q^*(s', a')]. \end{aligned}

4.1 Policy Evaluation

First, in order to compute the state-value function vπv_\pi for and arbitrary policy, we refere to the prediction problem mentioned in chapter 3, sS\forall s \in \mathcal S:

vπ(s)=Eπ[Rt+1+γRt+2+γ2Rt+3+...St=s]=Eπ[Rt+1+γvπ(St+1)St=s]=aπ(as)s,rp(s,rs,a)[r+γvπ(s)]\begin{aligned} v_\pi(s) &= \mathbb{E}_\pi [R_{t+1} + \gamma R_{t+2} + \gamma^2 R_{t+3} + ... | S_t = s] \\ &= \mathbb{E}_\pi [R_{t+1} + \gamma v_\pi(S_{t+1}) | S_t = s] \\ &= \displaystyle\sum_{a} \pi(a | s) \displaystyle\sum_{s', r} p(s', r |s, a)[r + \gamma v_\pi (s')] \end{aligned}

Where the existence of vπv_\pi is guaranteed by either γ<1\gamma < 1 or the eventual termination in all states under π\pi.

Full back ups involve subsituting thhe value of every state once to produce the new approximate value function vk+1v_{k+1}. All backs up done in DP algorithms are called full backups because they are based on all possible next states rather than on a sample next stated.

Input π, the policy to be evaluatedInitialize an array V(s)=0,sS+RepeatΔ0For each sS:V(s)aπ(as)p(s,rs,a)[r+γV(s)]Δmax(Δ,vV(s))until Δ<θ (some small positive number)Output Vvπ\boxed{ \begin{aligned} &\text{Input π, the policy to be evaluated} \\ &\text{Initialize an array } V(s) = 0, \forall s \in \mathcal S^+ \\ &\text{Repeat} \\ &\qquad \Delta \leftarrow 0\\ &\qquad \text{For each } s \in \mathcal S: \\ &\qquad \quad V(s) \leftarrow \textstyle\sum_a \pi (a | s) p(s', r |s, a) [r + \gamma V(s')] \\ &\qquad \quad \Delta \leftarrow \max (\Delta, | v - V(s) |) \\ &\text{until } \Delta < \theta \text{ (some small positive number)} \\ &\text{Output } V \approx v_\pi \end{aligned}}

Even with equiprobable random actions for a policy, iterative evaluation can converge to an optimal policy after few in-line iterations, provided a sufficiently small action space.

4.2 Policy Improvement

Suppose we have determined the value function vπ for an arbitrary deterministic policy π\pi. For some state s we would like to know whether or not we should change the policy to deterministically choose an action aπ(s)a \neq \pi(s). We know how good it is to follow the current policy from ss —that is vπ(s)v_\pi(s) —but would it be better or worse to change to the new policy? One way to answer this question is to consider selecting a in s and thereafter following the existing policy, ππ. The value of this way of behaving is

qπ(s,a)=Eπ[Rt+1+γvπ(st+1)St=a,At=a]=s,rp(s,rs,a)[r+γvπ(s)]\begin{aligned} q_\pi(s,a) &= \mathbb E_\pi [ R_{t+1} +\gamma v_\pi(s_{t+1}) | S_t =a, A_t = a] \\ &= \displaystyle\sum_{s', r} p(s',r |s, a)[r +\gamma v_\pi (s')] \end{aligned}

Here, if qπ(s,a)>vπ(s)q_\pi(s,a) > v_\pi(s), then it is better to select aa once in ss and thereafter follow π\pi than it would be to follow π\pi all the time, and therefore one would expect it to be better still to select aa every time ss is encountereted, and that this should be the new policy as it's better overall.

This is true in the spcial case of a general result called the policy improvement theorem. Let π,π\pi, \pi' be and pair of deterministic policies such that sS\forall s \in \mathcal S: qπ(s,π(s))vπ(s)q_\pi(s, \pi'(s)) \geq v_\pi(s). Then, the policy π\pi' must be as good as or better than π\pi. That is, it must obtain greater or equal expected return from all states.

given a policy and its value function, we can easilyevaluate a change in the policy at a single state to a particular action. It is a natural extension to consider changes at all states and to all possible actions, selecting at each state the action that appears best according to qπ(s,a)q_\pi(s, a). In other words, to consider the new greedy policy, π\pi' , given by

π(s)=arg maxaqπ(s,a)=arg maxaE[Rt+1γvπ(St+1)St=s,At=a]=arg maxas,rp(s,rs,a)[r+γvπ(s)]\begin{aligned} \pi'(s) &= \argmax \limits_a q_\pi(s,a) \\ &= \argmax \limits_a \mathbb E [R_{t+1} \gamma v_\pi(S_{t+1}) | S_t = s, A_t = a ]\\ &= \argmax \limits_a \displaystyle\sum_{s', r} p(s', r |s, a) [r + \gamma v_\pi(s')] \end{aligned}

Here, the greedy policy takes the action that looks best in the short term –after one step of lookahead– according to vπv_\pi. By construction, the greedy policy meets the conditions of the policy improvement theorem, so we know that it's as good or better than the original policy. The process of making a new policy that improves on an original polcy, by making it greedy w.r.t. the value function of an original policy is called policy improvement.

if vπ=vπv_\pi = v_{\pi'} then the above theorem is the same as the Bellman optimality equation and so both policies must be optimal.

4.3 Policy Iteration

Once a policy π\pi has been improved using vπv_\pi to yield a better policy π\pi', we can the compute vπv_{\pi'} and improve it again to yield an even better π\pi''. Thus we can monotonically improve policies and value functions:

π0Evπ0Iπ1Evπ1Iπ2E...IπEv\pi_0 \xrightarrow{\text E} v_{\pi_0} \xrightarrow{ \text I} \pi_1 \xrightarrow{\text E} v_{\pi_1} \xrightarrow{ \text I} \pi_2 \xrightarrow{\text E} ... \xrightarrow{ \text I} \pi^* \xrightarrow{\text E} v^*

where E,I\xrightarrow{\text {E,I}} denote evaluation and improvement, respectively and each policy is guaranteed to be a strict improvement over the previous one.

So now, the general algorithm for policy iteration is:

1. InitializationV(s)R2. Policy EvaluationRepeatΔ0For each sS:vV(s)V(s)a,rp(s,rs,π(s))[r+γV(s)]Δmax(Δ,vV(s))until Δ<θ (some small positive number)3. Policy Improvementpolicy-stabletrueFor each sS:aπ(s)π(s)arg maxas,rp(s,rs,a)[r+γV(s)]If aπ(s) then policy-stablefalseIf policy-stable, then stop and return V,π; else goto 2\boxed{ \begin{aligned} &\text{1. Initialization} \\ &\quad V(s) \in \R \\ &\text{2. Policy Evaluation} \\ &\quad \text {Repeat} \\ &\qquad \Delta \leftarrow 0\\ &\qquad \text{For each } s \in \mathcal S: \\ &\qquad \quad v \leftarrow V(s)\\ &\qquad \quad V(s) \leftarrow \textstyle\sum_{a,r} p(s', r |s, \pi(s)) [r + \gamma V(s')] \\ &\qquad \quad \Delta \leftarrow \max (\Delta, | v - V(s) |) \\ &\quad \text{until } \Delta < \theta \text{ (some small positive number)} \\ &\text{3. Policy Improvement} \\ &\quad policy\text{-}stable \leftarrow true \\ &\quad \text {For each } s \in \mathcal S: \\ &\qquad a \leftarrow \pi(s) \\ &\qquad \pi(s) \leftarrow \argmax_a \textstyle\sum_{s',r} p(s', r |s, a)[r + \gamma V(s')] \\ &\qquad \text{If } a \neq \pi(s) \text{ then } policy\text{-}stable \leftarrow false \\ &\quad \text{If } policy \text{-}stable, \text{ then stop and return } V, \pi \text{; else goto 2}\\ \end{aligned}}

though it may never terminate if the policy continually switches between two or more equally good policies.

4.4 Value iteration

One drawback to policy iteration is that each of its iterations involves policy evaluation, which may itself be a protracted iterative computation requiring multiple sweeps through the state set. If policy evaluation is done iteratively, then convergence exactly to vπv_\pi occurs only in the limit.

Policy evaluation can be truncated prior after a few steps in most cases without losing the convergence guarantees of policy iteration. An important case is when the policy evaluation is stopped after just one sweep (one backup of each state). This algorithm is called value iteration.

Like policy evaluation, value iteration formally requires an infinite number of iterations to converge exactly to vv^∗, though we tend to stop once the value function changes by only a small amount per sweep.

Initialize array V arbitrarily (e.g., V(s)=0,sS+)RepeatΔ0For each sS:vV(s)V(s)maxas,rp(s,rs,a)[r+γV(s)]Δmax(Δ,vV(s)until Δ<θ some small positive numberOutput a deterministic policy π, such that π(s)=argmaxas,rp(s,rs,a)[r+γV(s)]\boxed{ \begin{aligned} &\text{Initialize array } V \text{ arbitrarily (e.g., } V(s) = 0, \forall s \in \mathcal S^+ )\\ &\text{Repeat} \\ &\quad \Delta \leftarrow 0 \\ &\quad \text{For each } s\in \mathcal S : \\ &\qquad v \leftarrow V(s) \\ &\qquad V(s) \leftarrow \textstyle\max_a\sum_{s', r} p(s', r | s, a) [r + \gamma V(s')] \\ &\qquad \Delta \leftarrow \max(\Delta, |v - V(s|) \\ &\text{until } \Delta < \theta \text{ some small positive number} \\ &\text{Output a deterministic policy } \pi, \text{ such that } \\ &\quad\pi(s) = \textstyle\arg\max_a\sum_{s',r} p(s', r |s, a) [r + \gamma V(s')] \end{aligned}}

4.5 Asynchronous Dynamic Programming

Dyanamic Programming approaches discussed before are sometimes disadvantageous as they sweep the entirety of the state set.

If the state set is very large, then even a single sweep can be prohibitively expensive.

Thus, we introduce asynchronous DP algorithms which are in-place iterative, and organized independently of the terms of systematic sweeps of the state set. They back up the values of states in any order whatsoever, using whatever values of ther states that happen to be available. To conver correct, the async. algorithm must continue to backup the values of all states.

Async backups do not necessarily imply less computation, but they do mean that an algoirthm doesn't need to get locked in a hopelessly long sweep before progress can be made in improving the policy.

We can try to take advantage of this flexibility by selecting the states to which we apply backups so as to improve the algorithm’s rate of progress. We can try to order the backups to let value information propagate from state to state in an efficient way. Some states may not need their values backed up as often as others. We might even try to skip backing up some states entirely if they are not relevant to optimal behavior.

4.6 Generalized Policy Iteration

Policy iteration consists of two simultaneous, interacting processes, one making the value function consistent with the current policy (policy evaluation), and the other making the policy greedy with respect to the current value function (policy improvement).

These two processes alternate until hopefully the processes update all states, convergin on the optimal value function and policy.

The term generalized policy iteration (GPI) refers to this idea of interaction between evaluation and improvement. If both evaluation and improvement stabilize, i.e. no longer produce changes, the the value function and optimal policy must be optimal.

Thus, both processes stabilize only when a policy has been found that is greedy with respect to its own evaluation function.

4.7 Efficiency of Dynamic Programming

While DP may not be practical for very large programs, they're relatively efficient for solving MDPs. In the worst case, ignoring some technical details, DP methods take polynomial time to find an optimal policy. If m,nm, n represent the states and actions, then a DP method is guaranteed to find an optimal policy in mnm^n deterministic time.

On problems with large state spaces, asynchronous DP methods are often preferred.

4.8 Summary

Policy evaluation and policy improvement typically refer to the iterative computation of the value functions for a given policy and the improvement of that polucy given the value function of its prior self, respectively.

Combined, these two terms yield policy iteration and value iteration refer to the two most popular DP methods which reliably computer optimal policies and value functions for finite MDPs, given complete knowledge of the MDP.

Class DP methods operate in sweeps through a state set, performing full backup operation on each state, updating the value of the state based on the values of all weighted possibibilities of the values of successor states. These are related to Bellman equationsL there are four primary value funcitons (vπ,v,qπ,qv_\pi, v^*, q_\pi, q^*) corresponding to four Bellman equations and their full backups.

Generalized Policy Iteration is the general idea of two interacting processes revolving around approximate polciies and value functions is that eahc process changes the basis for the other, overall workign towards a convergent, joint solution where eahc, consequently, is optimal.

Note that all DP methods update estimates of the values of states based on the estimates of the values of successor states, which is called bootstrapping.

Chapter 5: Monte Carlo Methods

Monte Carlo methods require only experience composed of sample sequences of states, actions, and rewards from interaction with the environment. To ensure well-defined returns, we define Monte Carlo methods only for episodic tasks and only calculate value estimates and policies updates after episodes have terminated.

Monte Carlo methods can thus be incremental in an episode-by-episode sense, but not in a step-by-step (online) sense... Here we use it specifically for methods based on averaging complete returns (as opposed to methods that learn from partial returns, considered in the next chapter).

Monte Carlo methods sample average returns for state-action pairs like the bandit methods sampled average rewards previously - the difference being each state represents a bandit problem and are interrelated to one another. Thus, the problems aren onstationary.

To handle this nonstationary component of practical RL contexts, we adapt the General Policy Iteration techniques from CH 4 where we computed value functions to learning value functions from sample returns of an MDP.

First we consider the prediction problem (the computation of vπv_\pi and qπq_\pi for a fixed arbitrary policy π\pi) then policy improvement, and, finally, the control problem and its solution by GPI. Each of these ideas taken from DP is extended to the Monte Carlo case in which only sample experience is available

5.1 Monte Carlo Prediction

Recall that the value of a state is the expected return—expected cumulative future discounted reward—starting from that state. An obvious way to estimate it from experience, then, is simply to average the returns observed after visits to that state. As more returns are observed, the average should converge to the expected value.

The first-visit to a state ss under a Monte Carlo method estimates vπ(s)v_\pi(s), and theevery-visit Monte Carlo method averages returns from all states.

First Visit MC Method

Initialize:πpolicy to be evaluatedVan arbitrary state-value functionReturns(s)an empty list, sSRepeat forever:Generate an episode using πFor each state sappearing in the episode:Greturn following the first occurrence of sAppend G to Returns(s)V(s)average(Returns(s))\boxed{ \begin{aligned} &\text{Initialize:} \\ &\quad \pi \leftarrow \text{policy to be evaluated} \\ &\quad V \leftarrow \text{an arbitrary state-value function} \\ &\quad Returns(s) \leftarrow \text{an empty list, } \forall s \in \mathcal S \\ &\text{Repeat forever:} \\ &\quad \text{Generate an episode using } \pi \\ &\quad \text{For each state } s \text{appearing in the episode:} \\ &\qquad G \leftarrow \text{return following the first occurrence of } s \\ &\qquad \text{Append } G \text{ to } Returns(s) \\ &\qquad V(s) \leftarrow \text{average(} Returns(s) \text ) \\ \end{aligned}}

Note that we use capital VV for the approximate value function as it becomes a random variable after initilization.

Both first- and every-visit MC methods converge to vπ(s)v_\pi(s) as the number of visits to ss goes to infinity and each return is an independent, identically distributed estimate of vπ(s)v_\pi(s) with infinite variance.Each averaged is an unbiased estimate with σerror=1n\sigma_{error} = \frac {1}{\sqrt n}, wehre nn is the number of returns averaged. Every-visit is more complicated, but its estimates also asymptotically converge to vπ(s)v_\pi(s).

For the given example of blackjack, MC methods are superior to strict DP as DP methods require the distribution of next events (given by p(s,rs,a)p(s', r | s, a)), and those are difficult to determine in agame of blackjack as defined in the example.

An important fact about Monte Carlo methods is that the estimates for each state are independent. The estimate for one state does not build upon the estimate of any other state, as is the case in DP. In other words, Monte Carlo methods do not bootstrap as we defined it in the previous chapter... In particular, note that the computational expense of estimating the value of a single state is independent of the number of states. This can make Monte Carlo methods particularly attractive when one requires the value of only one or a subset of states. One can generate many sample episodes starting from the states of interest, averaging returns from only these states ignoring all others. This is a third advantage Monte Carlo methods can have over DP methods (after the ability to learn from actual experience and from simulated experience).

5.2 Monte Carlo Estimation of Action Values

If a model is not available, then it is particularly useful to estimate action values (the values of state–action pairs) rather than state values.

With a model, state values alone would be sufficient to determine an optimal policy by choosing the action that leads to the best combination of reward and ss'. Without a model, state values alone are insufficient as you must explicitly estimate the value of each action order for the values to be useful in suggesting a policy.

Thus, one of our primary goals for Monte Carlo methods is to estimate qq^∗. To achieve this, we first consider the policy evaluation problem for action values

Similarly, the evalutation problem for action values is to estimate qπ(s,a)q_\pi(s,a): the expected return starting from ss, taking action aa, and following π\pi thereafter. We simply modify the MC method to handle state-action pairs rather than only the states. Just as before, these MC methods converge quadratically upon the expected values as the number of visits to all state-action pairs approaches infinity.

Difficulties arise as many state-action pairs may never be visited. If π\pi is deterministic, then following it will observe returns only for one of the actions from each state. The no returns from the missing actions, the MC estimates of those will not improve with experience. This hinders the intentional ability to compare estimated values of all actions from each state.

This is similar to the exploration/exploitation problem insofar as we have to maintain exploration and can be resolved by specifying that episodes start in a state-action pair, and that each pair has a nonzero probability of being selected as the start. This ensures that all state-action pairs will be visited ad infinitum eventually - this is called the assumption of exploring starts.

5.3 Monte Carlo Control

MC Control refers to using MC estimation to approximate optimal policies.

The value function is repeatedly altered to more closely approximate the value function for the current policy, and the policy is repeatedly improved with respect to the current value function:

While each of these improvement and evaluation arcs work against one another by creating moving targets, they effectively force the policy and value function to approach optimality.

Again, we'll use the diagram:

π0Eqπ0Iπ1Eqπ1Iπ2E...IπEq\pi_0 \xrightarrow{\text E} q_{\pi_0} \xrightarrow{ \text I} \pi_1 \xrightarrow{\text E} q_{\pi_1} \xrightarrow{ \text I} \pi_2 \xrightarrow{\text E} ... \xrightarrow{ \text I} \pi^* \xrightarrow{\text E} q^*

to understand the process. Under the assumptions of infinite episodes generated with exploring starts, MC methods will compute each qπkq_{\pi_k} for arbitrary πk\pi_k.

Policy improvement is achieved by making the policy greedy w.r.t the current value function. For any action-value function qq, the corresponding greedy poly is the one that deterministically chooses an action the the maximal action-value:

π(s)=arg maxaq(s,a),sS\pi(s) = \argmax_a q(s, a),\quad \forall s \in \mathcal S

The corresponding policy improvement can be achieved by constructing each πk+1\pi_{k+1} as the greedy policy w.r.t. qπkq_{\pi_k}. Using the policy improvement theorem from CH 4.2:

qπk(s,πk+1(s))=qπk(s,arg maxaqπk(s,a))=maxaqπk(s,a)qπk(s,qπk(s))=vπk(s)\begin{aligned} q_{\pi_k}(s, \pi_{k+1}(s)) &= q_{\pi_k}(s, \argmax_a q_{\pi_k}(s,a)) \\ &= \max_a q_{\pi_k}(s, a) \\ &\geq q_{\pi_k}(s, q_{\pi_k}(s)) \\ &= v_{\pi_k}(s) \end{aligned}