qing wang summerintern the use of bandit algorithms in ... wang... · the use of bandit algorithms...

42
The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018

Upload: others

Post on 18-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems

1

Intern: Qing Wang 6/6/2018

Page 2: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

OutlineØ IntroductionØ Research Problems

○ Online Context-aware Recommendation with Time-varying Multi-armed Bandit■ Dynamical Context Drift Model

○ Online Context-based recommendation Using Hierarchical Multi-armed Bandit■ Hierarchical Multi-armed Bandit Model

○ Online Interactive Collaborative Filtering Using Multi-armed Bandit with Dependent Arms■ Interactive Collaborative Topic Regression Model

2

Page 3: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Introduction

3

Interactive recommender systems:

1) Promptly feed users the interesting items (e.g., news, movies);

2) Adaptively optimize the underlying model using the up-to-date feedback ( );

3) Ultimate Goal: continuously maximize user satisfaction in a long run.

Page 4: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

A General Process of Interactive Recommendation

4

Profiling Problem Profiles

RecommendationAlgorithms

User Preference

Preference Drift

User/Item Dependence

Contextual Multi-armed Bandits Interactive Collaborative Filtering

InteractionData

Research Problems:1. Learn user preference2. Track preference drift3. Learn and use user/item dependence

Page 5: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

OutlineØ Introduction Ø Research Problems

○ Online Context-aware Recommendation with Time-varying Multi-armed Bandit■ Dynamical Context Drift Model

○ Online Context-based recommendation Using Hierarchical Multi-armed Bandit■ Hierarchical Multi-armed Bandit Model

○ Online Interactive Collaborative Filtering Using Multi-armed Bandit with Dependent Arms■ Interactive Collaborative Topic Regression Model

2

Page 6: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Online Context-aware Recommendation with Time-varying Multi-armed Bandit

6

Example:Given the same contextual information for each article, the average CTR distribution of five news articles from Yahoo! news repository is displayed. The CTR is aggregated by every hour.

Challenge: How do we promptly capture both of the varying popularity of item content and theevolving customer preferences over time, and further utilize them for recommendation improvement?

Page 7: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Contextual Multi-armed Bandit Algorithm

7

The reward 𝑟",$ is typically modeled as a linear combination of the feature vector 𝑥$ with coefficient vector 𝒘", given at time 𝑡 = [1, … , 𝑇] as follows: 𝑟",$~𝑁(𝑥$1𝒘", 𝜎"3)

The optimal policy 𝜋∗ is defined as the one with maximum accumulated expected reward after T iterations:

𝜋∗ = 𝑎𝑟𝑔max;

<𝐸𝒘>(@A)(𝑥$1𝒘;(CA)|𝑡)

1

$EF

Page 8: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Dynamic Context Drift Modeling

8

The aforementioned model is based on the assumption that coefficient vector 𝒘" is unknown but fixed.

The stationary component

The drift component

a d×d dimension identity matrix

Page 9: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Dynamic Context Drift Modeling

9

The reward 𝑦",$ is modeled to be drawn from the following Gaussian distribution.

Page 10: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Experiments

Ø Context Change Tracking, CTR (Click-Through Rate) Optimizationa) Dataset: KDD Cup 2012 Online Advertising, Yahoo! Today News.b) Evaluation Method: simulation and replayer [1].

101. L. Li, W. Chu, J. Langford, T. Moon, and X. Wang. An unbiased offline evaluation of contextual bandit algorithms with generalized linear models. JMLR, 26:19-36, 2012.

Page 11: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

ConclusionØ Take the dynamic behavior of reward into account and model it as a random walk. Ø A dynamic context drift model is proposed to track the contextual dynamics and consequently

improve the performance of personalized recommendation in terms of CTRs

11

Page 12: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

OutlineØ Introduction Ø Research Problems

○ Online Context-aware Recommendation with Time-varying Multi-armed Bandit■ Dynamical Context Drift Model

○ Online Context-based recommendation Using Hierarchical Multi-armed Bandit■ Hierarchical Multi-armed Bandit Model

○ Online Interactive Collaborative Filtering Using Multi-armed Bandit with Dependent Arms■ Interactive Collaborative Topic Regression Model

10

Page 13: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

IT automation recommendation modeling

13

IT Automation Services (ITAS) is introduced into IT service management. An automation is a scripted resolution.

Automation EngineRule-based Virtual Engineer

Problem Server I

Problem Server 2

An overview of IT Automation Services

Page 14: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

IT Automation Recommendation Modeling

14

A sample ticket in ITSM and its corresponding automaton.

feedback

Page 15: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Challenge

Ø Challenge: How do we efficiently improve the performance of recommendation using the explicit automation hierarchies of IT automation services?

15

For example, a ticket is generated due to a failure of the DB2 database. The root cause may be database deadlock, high usage or other issues.

We model it as a multi-armed problem with dependent arms, where arms are in the form of hierarchies.

Page 16: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Hierarchical IT Automation Recommendation Modeling

16

In hierarchical IT automation recommendation, 𝑥$indicates ticket problem, 𝑎I represents an automation. ℋ denotes the hierarchy.

Our objective function is:

Page 17: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Hierarchial Multi-armed Bandit Algorithm

17

At time t = [1,…,T]:

Level 0

Level 1

Level 2

Page 18: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Hierarchial Multi-armed Bandit Algorithm

18

Level 0

Level 1

Level 2

At time t = [1,…,T]:

Page 19: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Hierarchial Multi-armed Bandit Algorithm

19

Level 0

Level 1

Level 2

At time t = [1,…,T]:

Page 20: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Hierarchial Multi-armed Bandit Algorithm

20

Level 0

Level 1

Level 2

1 or 0

At time t = [1,…,T]:

Page 21: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Hierarchial Multi-armed Bandit Algorithm

21

Level 0

Level 1

Level 2

1 or 0

At time t = [1,…,T]:

Page 22: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Hierarchial Multi-armed Bandit Algorithm

22

Level 0

Level 1

Level 2

1 or 0

At time t = [1,…,T]:

Page 23: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Experiment

23

Ø Data Set○ Experimental tickets are collected by IBM Tivoli Monitoring system covering from

July 2016 to March 2017 with the size of |D| = 116,429.○ The dataset contains 1,091 alert keys (e.g., cpusum_xuxc_aix, prccpu_rlzc_std) and 62

automations (e.g., NFS automation, process CPU spike automation) in total.○ A three-layer hierarchy H.

Ø Evaluate Method○ Replayer method.

Page 24: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Experiment

24

Page 25: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Conclusion

25

Ø Take the hierarchical information into account and model it as a multi-armed bandit problem with dependent arms.

Ø Propose hierarchical multi-armed bandit (HMAB) algorithms.

Page 26: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

OutlineØ Introduction Ø Research Problems

○ Online Context-aware Recommendation with Time-varying Multi-armed Bandit■ Dynamical Context Drift Model

○ Online Context-based recommendation Using Hierarchical Multi-armed Bandit■ Hierarchical Multi-armed Bandit Model

○ Online Interactive Collaborative Filtering Using Multi-armed Bandit with Dependent Arms■ Interactive Collaborative Topic Regression Model

24

Page 27: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Challenge

27

This can be naturally modeled as an interactive collaborative filtering problem, which has been first introduced in [2].

Ø Challenge 1: How do we effectively recommend a proper item to the target user with no contextual information of user/item, but only the users’ interaction data on items can be utilized?

2. X. Zhao, W. Zhang, and J. Wang. Interactive collaborative filtering. In CIKM, pages 1411-1420. 2013.

Page 28: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Interactive Collaborative Fitlering Problem

28

Bayesian Probabilistic Matrix Factorization

Collaborative Bandit Model

Recommend an itemFeedback (rating)Update parameters

No context information can be observed.

Item 1

Item 2

Item N

Page 29: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Where𝕊(𝑡) is available information observed at time 𝑡.

There are M users and N items. The partially observed matrix R is the preference of the users for the items. In the collaborative bandit model, the rating is estimated by a product of user and item feature vectors 𝑝M and 𝑞O.

Interactive Collaborative Fitlering Problem

29

𝑟M,O~𝑁(𝑝M1 𝑞O, 𝜎3)

The objective function can be written as follows:

However, these models assume the arms (i.e.) are independent.

Page 30: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Interactive Collaborative Topic Regression Model

30

In light of the topic modeling techniques, we formulate the item dependencies as the clusters on arms and come up with a generative model to generate the items from their underlying topics.

The graphical representation for ICTR model

item1, item q, …item n User 1

item3, item k, …item iUser m

item1, item 2, …item o User x

document words

Page 31: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Interactive Collaborative Topic Regression Model

31

The graphical representation for ICTR model

The predicted rating �̂�M,$ can be inferred by

𝑛 = 𝑥M,$

Page 32: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Experiment

32

Ø Data Set

Ø Evaluate Method○ Replayer method.

Data Set Yahoo News MovieLens (10M)

#users 226,710 71,567

#items 652 10,681

#ratings 280,410,150 10,000,054

Page 33: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Experiment

33

Page 34: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Conclusion

Ø Only user/item rating matrix is taken into account and model it as a multi-armed bandit problem with dependent arms.

Ø Propose Interactive Collaborative Topic Regression (ICTR) model to learn the dependence among arms.

34

Page 35: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Q & A

35

Page 36: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Online Inference of ICTR Model: Particle Learning

36

Page 37: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Online Inference of ICTR Model: Particle Learning

37

Page 38: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Let 𝒫M,O $SF denote the particle set at time 𝑡 − 1 and 𝒫M,O($SF)(I) be the 𝑖$V particles given both ticket

problem 𝑚 and automation 𝑛(𝑡 − 1) at time (𝑡 − 1), where 1 ≪ 𝑖 ≪ 𝐵. Each particle has a weight, denoted as 𝜌(I), where ∑ 𝜌(I)\

IEF =1. The fitness of each particle 𝒫M,O($SF)(I) is defined as the likelihood of

the observed data 𝑥M,$ and 𝑟M,$. Therefore,

As further deriving,

Re-sample Particles with Weights

38

Page 39: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Latent State Inference

39

Provide with new observation 𝑥M,$ and 𝑟M,$ at time 𝑡, the random state 𝑧M,$can be any one of 𝐾 topics.The posterior distribution of 𝑧M,$ is shown as follows, where 𝜃 ∈ ℛb:

𝜃 can be computed by 𝜃 ∝ 𝐸(𝑝M,"|𝑟M,$, 𝜆) e 𝐸(Ψ",O|𝑟M,$, 𝜆)

Where ℐ e is an indicator function, returns 1 when the input Boolean expression is true and otherwise return 0.

Page 40: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Parameter Statistics Inference

40

Assume are the sufficient statistics at time 𝑡, which are updated on the sufficient statistics at 𝑡-1,andnewobservationdata 𝑥M,$and 𝑟M,$ at time 𝑡 as follows.

At time 𝑡, the sampling process for the parameter random variables is summarized as below:

Page 41: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Integrate with Policies: Thompson sampling

41

Without new observation 𝑥M,$ and 𝑟M,$, the particle re-sampling, latent state inference and parameter statistics inference for time 𝑡, therefore, we utilize the latent vectors 𝑝M and 𝑞O sampled from their posterior distributions at time 𝑡-1 predicting the reward for each arm.

In our model, each item has B independent particles. Based on Thompson sampling, the policy select an arm n(t) using the following equation:

Where denotes the average reward:

Page 42: Qing Wang SummerIntern The Use of Bandit Algorithms in ... Wang... · The Use of Bandit Algorithms in Intelligent Interactive Recommender Systems 1 Intern: Qing Wang 6/6/2018. Outline

Integrate with Policies: UCB

42

According to UCB policy, it select an arm n(t) based on the upper bound of the predicted reward. Assuming that

the UCB is developed by the mean and variance of predicted reward.

where 𝛾 ≫ 0 is a predefined threshold, and the variance is

�̅�M,O= F\∑ 𝑟M,$

(I)\IEF