Interventions. Online Learning from User Interactions through Interventions. Interactive Learning Systems
|
|
- Daniela Grant
- 5 years ago
- Views:
Transcription
1 Online Learning from Interactions through Interventions CS Fall 2016 horsten Joachims Department of Computer Science & Department of Information Science Cornell University Y. Yue, J. Broder, R. Kleinberg,. Joachims. he K-armed Dueling Bandits Problem. In COL, P. Shivaswamy,. Joachims. Online Structured Prediction via Coactive Learning, ICML, s Examples Search engines Entertainment media E-commerce Smart homes / robots Learning Gathering and maintenance of knowledge Measure and optimize performance Personalization Interventions Information Elicitation from the Dueling Bandits: -driven exploration Coactive Learning: -driven exploration Decide between two Ranking Functions Distribution P(x) of x=(user, query) (tj, SVM ) Retrieval Function 1 Which one Retrieval Function 2 f 1 (x) y 1 is better? f 2 (x) y 2 2. SVM-Light Support Vector Machine 3. School of Veterinary Medicine at UPenn 4. An Introduction to Support Vector Machines 5. Service Master Company 1. School of Veterinary Medicine at UPenn 2. Service Master Company 3. Support Vector Machine 4. Archives of SUPPOR-VECOR-MACHINES 5. SVM-Light Support Vector Machine U(tj, SVM,y 1 ) U(tj, SVM,y 2 ) Name Description Aggregation Measuring Utility Abandonment Rate % of queries with no click N/A Increase Reformulation Rate Queries per Session % of queries that are followed by reformulation Session = no interruption of more than 30 minutes N/A Mean Hypothesized Change with Decreased Quality Increase Increase s per Query Number of clicks Mean % of queries with clicks at position 1 N/A Decrease Max Reciprocal Rank* 1/rank for highest click Mean Decrease Mean Reciprocal Rank* Mean of 1/rank for all clicks Mean Decrease ime to First * Seconds before first click Median Increase ime to Last * Seconds before final click Median Decrease (*) only queries with at least one click count Arxiv.org: Results Conclusions ORIG FLA None of the absolute metrics reflects RAND expected order. ORIG Most differences not significant SWAP2 after one month of data. SWAP4 Analogous results for Yahoo! Search with much more data [Chapelle et al., 2012]. [Radlinski et al., 2008] 1
2 Percent Wins A Model of how s in Search Model of clicking: s explore ranking to position k s click on most relevant (looking) links in top k s stop clicking when time budget up or other action more promising (e.g. reformulation) Empirically supported by [Granka et al., 2004] argmax U(y) y op k 2. Support Vector Machine 3. An Introduction to Support Vector Machines 4. Archives of SUPPOR-VECOR-MACHINES SVM-Light Support Vector Machine Balanced Interleaving x=(u=tj, q= svm ) f 1 (x) y 1 f 2 (x) y 2 Model of : Better retrieval functions is more likely to get more clicks. Interleaving(y 1,y 2 ) 1 2. Support Vector Machine 2 3. SVM-Light Support Vector Machine 2 4. An Introduction to Support Vector Machines 3 5. Support Vector Machine and Kernel... References Archives of SUPPOR-VECOR-MACHINES Lucent echnologies: SVM demo applet SVM-Light Support Vector Machine 3. Support Vector Machine and Kernel... References 4. Lucent echnologies: SVM demo applet 5. Royal Holloway Support Vector Machine Invariant: For all k, top k of balanced interleaving is union of top k 1 of r 1 and top k 2 of r 2 with k 1 =k 2 ± 1. Interpretation: (y 1 Â y 2 ) clicks(topk(y 1 )) > clicks(topk(y 2 )) see also [Radlinski, Craswell, 2012] [Hofmann, 2012] [Joachims, 2001] [Radlinski et al., 2008] Arxiv.org: Interleaving Results % wins ORIG % wins RAND Conclusions All interleaving experiments reflect the expected order. All differences are significant after one month of data. Same results also for alternative data-preprocessing. Yahoo and Bing: Interleaving Results Yahoo Web Search [Chapelle et al., 2012] Four retrieval functions (i.e. 6 paired comparisons) Balanced Interleaving All paired comparisons consistent with ordering by NDCG. Bing Web Search [Radlinski & Craswell, 2010] Five retrieval function pairs eam-game Interleaving Consistent with ordering by NDGC when NDCG significant. Efficiency: Interleaving vs. Explicit Bing Web Search 4 retrieval function pairs ~12k manually judged queries ~200k interleaved queries Experiment p = probability that NDCG is correct on subsample of size y x = number of queries needed to reach same p-value with interleaving en interleaved queries are equivalent to one manually judged query. [Radlinski & Craswell, 2010] Information Elicitation from the Dueling Bandits: -driven exploration Coactive Learning: -driven exploration 2
3 Learning on Operational Example: 4 retrieval functions: A > B >> C > D 10 possible pairs for interactive experiment (A,B) low cost to user (A,C) medium cost to user (C,D) high cost to user (A,A) zero cost to user Minimizing Regret Don t present bad pairs more often than necessary rade off (long term) informativeness and (short term) cost Definition: Probability of (f t, f t ) losing against the best f Dueling Bandits Problem R(A) = P f Âf t P f Âf t 0.5 [Yue, Broder, Kleinberg, Joachims, 2010] First hought: ournament Noisy Sorting/Max s: [Feige et al.]: riangle ournament Heap O(n/ 2 log(1/ )) with prob 1- [Adler et al., Karp & Kleinberg]: optimal under weaker assumptions X 3 X 5 X 5 X 7 X 2 X 3 X 4 X 5 X 6 X 7 X 8 : Interleaved Filter 2 InterleavedFilter1(,W={f 1 f K }) Pick random f from W =1/(K 2 ) WHILE W >1 FOR b 2 W DO» duel(f,f)» update P f t=t+1 c t =(log(1/ )/t) 0.5 Remove all f from W with P f < 0.5-c t [WORSE WIH PROB 1- ] IF there exists f with P f > 0.5+c t [BEER WIH PROB 1- ]» Remove f from W» Remove all f from W that are empirically inferior to f» f =f ; t=0 UNIL : duel(f,f ) Related s: [Hofmann, Whiteson, Rijke, 2011] [Yue, Joachims, 2009] [Yue, Joachims, 2011] f 1 f 2 f =f 3 f 4 f 5 0/0 0/0 0/0 0/0 f 1 f 2 f =f 3 f 4 f 5 8/2 7/3 4/6 1/9 f 1 f 2 f =f 3 f 4 13/2 11/4 7/8 XX f =f 1 f 2 f 4 0/0 0/0 XX XX XX [Yue et al., 2009] Assumptions Preference Relation: f i  f j P(f i  f j ) = 0.5+ i,j > 0.5 Weak Stochastic ransitivity: f i  f j and f j  f k f i  f k heorem: fif2 1  incurs f 2  expected f 3  f 4  average f 5  regret f 6  bounded  f K by Strong Stochastic ransitivity: i,k max{ i,j, j,k } 1,4 2,4 3, ,4 6,4 K,4 Stochastic riangle Inequality: f i  f j  f k i,k i,j + j,k 1,2 = 0.01 and 2,3 = , Winner exists: = max i { P(f 1  f i )-0.5 } = 1,2 > 0 Who does the exploring? Example 1 Information Elicitation from the Dueling Bandits: -driven exploration Coactive Learning: -driven exploration 3
4 Who does the exploring? Example 2 Who does the exploring? Example 3 Coactive Feedback Model Machine ranslation Interaction: given x prediction y explored y Improved Prediction Set of all y for context x y Feedback: Improved prediction ӯ t U(ӯ t x t ) > U(y t x t ) Supervised learning: optimal prediction y t * y t * = argmax y U(y x t ) Optimal Prediction y t x t We propose Coactive Learning as a model of interaction between a learning system and a human user, where both have the common goal of providing results of maximum utility to the user. Wir schlagen vor, koaktive Learning als ein Modell der Wechselwirkung zwischen einem Lernsystem und menschlichen Benutzer, wobei sowohl die gemeinsame Ziel, die Ergebnisse der maximalen Nutzen für den Benutzer. Á Wir schlagen vor, koaktive Learning als ein Modell der Wechselwirkung des Dialogs zwischen einem Lernsystem und menschlichen Benutzer, wobei sowohl die beide das gemeinsame Ziel haben, die Ergebnisse der maximalen Nutzen für den Benutzer zu liefern. ӯ t Coactive Preference Perceptron Model Linear model of user utility: U(y x) = w Á(x,y) FOR t = 1 O DO Observe x t Present y t = argmax y { w t (x t,y) } Obtain feedback ӯ t from user Update w t+1 = w t + (x t,ӯ t ) - (x t,y t ) his may look similar to a multi-class Perceptron, but Feedback ӯ t is different (not get the correct class label) Regret is different (misclassifications vs. utility difference) R A = 1 U y t x) U y t x Never revealed: cardinal feedback optimal y * [Shivaswamy, Joachims, 2012] Coactive Perceptron: Regret Bound Model U(y x) = w ɸ(x,y), where w is unknown Feedback: ξ-approximately α-informative E U x t, y t U x t, y t + α U x t, y t U x t, y t ξ t heorem For user feedback ӯ that is α-informative in expectation, the expected average regret of the Preference Perceptron is bounded by E 1 user feedback system prediction U y t x) U y t x 1 α model error gap to optimal ξ t 2R w + α model error zero [Shivaswamy, Joachims, 2012] 4
5 Cumulative Cumulative Win Win Ratio Ratio Preference Perceptron: Experiment Experiment: Automatically optimize Arxiv.org Fulltext Search Model Analogous to DCG Utility of ranking y for query x: U t (y x) = i i w t Á(x,y (i) ) [~1000 features] Computing argmax ranking: sort by w t Á(x,y (i) ) Feedback Construct ӯ t from y t by moving Coactive Coactive clicked links one position higher. Learning Learning Perturbation [Raman et al., 2013] Baseline Handtuned w base for U base (y x) Baseline Baseline Evaluation Interleaving of ranking from U t (y x) and U base (y x) Number of of Feedback [Raman et al., 2013] Design! y t dependent on x t x t+1 dependent on y t (e.g. click given ranking, new query) Information Elicitation Interventions Decisions Feedback Learning Dueling Bandits Model: Pairwise comparison test P( y i  y j U(y i )>U(y j ) ) : Interleaved Filter 2, O( Y log()) regret Coactive Learning Model: for given y, user provides ӯ with U(ӯ x) > U(y x) : Preference Perceptron, O(ǁwǁ 0.5 ) regret Model! Running Interactive Learning Experiments 1) Build your own system and provide service a lot of work too little data 2) Convince others to run your experiments on commercial system good luck with that 3) Use large-scale historical log data from commercial system Learning from Human Decisions Decision Model Design Space: Decision Model Utility Model Interaction Experiments Feedback ype Regret Applications Application Learning Contact: tj@cs.cornell.edu Software + Papers: Related Fields: Micro Economics Decision heory Econometrics Psychology Communications Cognitive Science 5
Learning from Rational * Behavior
Learning from Rational * Behavior Josef Broder, Olivier Chapelle, Geri Gay, Arpita Ghosh, Laura Granka, Thorsten Joachims, Bobby Kleinberg, Madhu Kurup, Filip Radlinski, Karthik Raman, Tobias Schnabel,
More informationStable Coactive Learning via Perturbation
Karthik Raman horsten Joachims Department of Computer Science, Cornell University, Ithaca, NY, USA Pannaga Shivaswamy A& Research, San Francisco, CA, USA obias Schnabel Fachbereich Informatik, Universitaet
More informationStable Coactive Learning via Perturbation
Karthik Raman horsten Joachims Department of Computer Science, Cornell University, Ithaca, NY, USA Pannaga Shivaswamy A& Research, San Francisco, CA, USA obias Schnabel Fachbereich Informatik, Universitaet
More informationOPTIMIZING SEARCH ENGINES USING CLICKTHROUGH DATA. Paper By: Thorsten Joachims (Cornell University) Presented By: Roy Levin (Technion)
OPTIMIZING SEARCH ENGINES USING CLICKTHROUGH DATA Paper By: Thorsten Joachims (Cornell University) Presented By: Roy Levin (Technion) Outline The idea The model Learning a ranking function Experimental
More informationThe K-armed Dueling Bandits Problem
The K-armed Dueling Bandits Problem Yisong Yue, Josef Broder, Robert Kleinberg, Thorsten Joachims Abstract We study a partial-information online-learning problem where actions are restricted to noisy comparisons
More informationLearning Socially Optimal Information Systems from Egoistic Users
Learning Socially Optimal Information Systems from Egoistic Users Karthik Raman and Thorsten Joachims Department of Computer Science, Cornell University, Ithaca, NY, USA {karthik,tj}@cs.cornell.edu http://www.cs.cornell.edu
More informationInformation Retrieval
Information Retrieval Online Evaluation Ilya Markov i.markov@uva.nl University of Amsterdam Ilya Markov i.markov@uva.nl Information Retrieval 1 Course overview Offline Data Acquisition Data Processing
More informationRelative Upper Confidence Bound for the K-Armed Dueling Bandit Problem
Relative Upper Confidence Bound for the K-Armed Dueling Bandit Problem Masrour Zoghi 1, Shimon Whiteson 1, Rémi Munos 2 and Maarten de Rijke 1 University of Amsterdam 1 ; INRIA Lille / MSR-NE 2 June 24,
More informationInteractively Optimizing Information Retrieval Systems as a Dueling Bandits Problem
Interactively Optimizing Information Retrieval Systems as a Dueling Bandits Problem Yisong Yue Thorsten Joachims Department of Computer Science, Cornell University, Ithaca, NY 14853 USA yyue@cs.cornell.edu
More informationCS-E4830 Kernel Methods in Machine Learning
CS-E4830 Kernel Methods in Machine Learning Lecture 5: Multi-class and preference learning Juho Rousu 11. October, 2017 Juho Rousu 11. October, 2017 1 / 37 Agenda from now on: This week s theme: going
More informationBeat the Mean Bandit
Yisong Yue H. John Heinz III College, Carnegie Mellon University, Pittsburgh, PA, USA Thorsten Joachims Department of Computer Science, Cornell University, Ithaca, NY, USA yisongyue@cmu.edu tj@cs.cornell.edu
More informationCounterfactual Evaluation and Learning
SIGIR 26 Tutorial Counterfactual Evaluation and Learning Adith Swaminathan, Thorsten Joachims Department of Computer Science & Department of Information Science Cornell University Website: http://www.cs.cornell.edu/~adith/cfactsigir26/
More informationCoactive Learning for Locally Optimal Problem Solving
Coactive Learning for Locally Optimal Problem Solving Robby Goetschalckx, Alan Fern, Prasad adepalli School of EECS, Oregon State University, Corvallis, Oregon, USA Abstract Coactive learning is an online
More informationAn Introduction to Machine Learning
An Introduction to Machine Learning L6: Structured Estimation Alexander J. Smola Statistical Machine Learning Program Canberra, ACT 0200 Australia Alex.Smola@nicta.com.au Tata Institute, Pune, January
More informationNew Algorithms for Contextual Bandits
New Algorithms for Contextual Bandits Lev Reyzin Georgia Institute of Technology Work done at Yahoo! 1 S A. Beygelzimer, J. Langford, L. Li, L. Reyzin, R.E. Schapire Contextual Bandit Algorithms with Supervised
More informationSupport Vector and Kernel Methods
SIGIR 2003 Tutorial Support Vector and Kernel Methods Thorsten Joachims Cornell University Computer Science Department tj@cs.cornell.edu http://www.joachims.org 0 Linear Classifiers Rules of the Form:
More informationCS 188: Artificial Intelligence Spring Announcements
CS 188: Artificial Intelligence Spring 2010 Lecture 22: Nearest Neighbors, Kernels 4/18/2011 Pieter Abbeel UC Berkeley Slides adapted from Dan Klein Announcements On-going: contest (optional and FUN!)
More informationLearning Socially Optimal Information Systems from Egoistic Users
Learning Socially Optimal Information Systems from Egoistic Users Karthik Raman and Thorsten Joachims Department of Computer Science, Cornell University, Ithaca, NY, USA {karthik,tj}@cs.cornell.edu http://www.cs.cornell.edu
More informationA Relative Exponential Weighing Algorithm for Adversarial Utility-based Dueling Bandits
A Relative Exponential Weighing Algorithm for Adversarial Utility-based Dueling Bandits Pratik Gajane Tanguy Urvoy Fabrice Clérot Orange-labs, Lannion, France PRATIK.GAJANE@ORANGE.COM TANGUY.URVOY@ORANGE.COM
More informationAd Placement Strategies
Case Study 1: Estimating Click Probabilities Tackling an Unknown Number of Features with Sketching Machine Learning for Big Data CSE547/STAT548, University of Washington Emily Fox 2014 Emily Fox January
More informationInformation Retrieval and Organisation
Information Retrieval and Organisation Chapter 13 Text Classification and Naïve Bayes Dell Zhang Birkbeck, University of London Motivation Relevance Feedback revisited The user marks a number of documents
More informationPreference-Based Rank Elicitation using Statistical Models: The Case of Mallows
Preference-Based Rank Elicitation using Statistical Models: The Case of Mallows Robert Busa-Fekete 1 Eyke Huellermeier 2 Balzs Szrnyi 3 1 MTA-SZTE Research Group on Artificial Intelligence, Tisza Lajos
More informationSemestrial Project - Expedia Hotel Ranking
1 Many customers search and purchase hotels online. Companies such as Expedia make their profit from purchases made through their sites. The ultimate goal top of the list are the hotels that are most likely
More informationAnnouncements. CS 188: Artificial Intelligence Spring Classification. Today. Classification overview. Case-Based Reasoning
CS 188: Artificial Intelligence Spring 21 Lecture 22: Nearest Neighbors, Kernels 4/18/211 Pieter Abbeel UC Berkeley Slides adapted from Dan Klein Announcements On-going: contest (optional and FUN!) Remaining
More informationLarge-scale Information Processing, Summer Recommender Systems (part 2)
Large-scale Information Processing, Summer 2015 5 th Exercise Recommender Systems (part 2) Emmanouil Tzouridis tzouridis@kma.informatik.tu-darmstadt.de Knowledge Mining & Assessment SVM question When a
More informationCS 188: Artificial Intelligence. Outline
CS 188: Artificial Intelligence Lecture 21: Perceptrons Pieter Abbeel UC Berkeley Many slides adapted from Dan Klein. Outline Generative vs. Discriminative Binary Linear Classifiers Perceptron Multi-class
More informationLarge-Scale Behavioral Targeting
Large-Scale Behavioral Targeting Ye Chen, Dmitry Pavlov, John Canny ebay, Yandex, UC Berkeley (This work was conducted at Yahoo! Labs.) June 30, 2009 Chen et al. (KDD 09) Large-Scale Behavioral Targeting
More informationBandit Algorithms. Zhifeng Wang ... Department of Statistics Florida State University
Bandit Algorithms Zhifeng Wang Department of Statistics Florida State University Outline Multi-Armed Bandits (MAB) Exploration-First Epsilon-Greedy Softmax UCB Thompson Sampling Adversarial Bandits Exp3
More informationNEW LEARNING FRAMEWORKS FOR INFORMATION RETRIEVAL
NEW LEARNING FRAMEWORKS FOR INFORMATION RETRIEVAL A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor
More informationOnline Rank Elicitation for Plackett-Luce: A Dueling Bandits Approach
Online Rank Elicitation for Plackett-Luce: A Dueling Bandits Approach Balázs Szörényi Technion, Haifa, Israel / MTA-SZTE Research Group on Artificial Intelligence, Hungary szorenyibalazs@gmail.com Róbert
More informationSome Formal Analysis of Rocchio s Similarity-Based Relevance Feedback Algorithm
Some Formal Analysis of Rocchio s Similarity-Based Relevance Feedback Algorithm Zhixiang Chen (chen@cs.panam.edu) Department of Computer Science, University of Texas-Pan American, 1201 West University
More informationCase Study 1: Estimating Click Probabilities. Kakade Announcements: Project Proposals: due this Friday!
Case Study 1: Estimating Click Probabilities Intro Logistic Regression Gradient Descent + SGD Machine Learning for Big Data CSE547/STAT548, University of Washington Sham Kakade April 4, 017 1 Announcements:
More informationMergeRUCB: A Method for Large-Scale Online Ranker Evaluation
MergeRUCB: A Method for Large-Scale Online Ranker Evaluation Masrour Zoghi Shimon Whiteson Maarten de Rijke University of Amsterdam, Amsterdam, The Netherlands {m.zoghi, s.a.whiteson, derijke}@uva.nl ABSTRACT
More informationNatural Language Processing. Classification. Features. Some Definitions. Classification. Feature Vectors. Classification I. Dan Klein UC Berkeley
Natural Language Processing Classification Classification I Dan Klein UC Berkeley Classification Automatically make a decision about inputs Example: document category Example: image of digit digit Example:
More informationCS 188: Artificial Intelligence Fall 2011
CS 188: Artificial Intelligence Fall 2011 Lecture 22: Perceptrons and More! 11/15/2011 Dan Klein UC Berkeley Errors, and What to Do Examples of errors Dear GlobalSCAPE Customer, GlobalSCAPE has partnered
More informationErrors, and What to Do. CS 188: Artificial Intelligence Fall What to Do About Errors. Later On. Some (Simplified) Biology
CS 188: Artificial Intelligence Fall 2011 Lecture 22: Perceptrons and More! 11/15/2011 Dan Klein UC Berkeley Errors, and What to Do Examples of errors Dear GlobalSCAPE Customer, GlobalSCAPE has partnered
More informationLarge-scale Linear RankSVM
Large-scale Linear RankSVM Ching-Pei Lee Department of Computer Science National Taiwan University Joint work with Chih-Jen Lin Ching-Pei Lee (National Taiwan Univ.) 1 / 41 Outline 1 Introduction 2 Our
More informationBandits and Exploration: How do we (optimally) gather information? Sham M. Kakade
Bandits and Exploration: How do we (optimally) gather information? Sham M. Kakade Machine Learning for Big Data CSE547/STAT548 University of Washington S. M. Kakade (UW) Optimization for Big data 1 / 22
More informationA Gradient-based Adaptive Learning Framework for Efficient Personal Recommendation
A Gradient-based Adaptive Learning Framework for Efficient Personal Recommendation Yue Ning 1 Yue Shi 2 Liangjie Hong 2 Huzefa Rangwala 3 Naren Ramakrishnan 1 1 Virginia Tech 2 Yahoo Research. Yue Shi
More informationarxiv: v1 [cs.lg] 15 Jan 2016
A Relative Exponential Weighing Algorithm for Adversarial Utility-based Dueling Bandits extended version arxiv:6.3855v [cs.lg] 5 Jan 26 Pratik Gajane Tanguy Urvoy Fabrice Clérot Orange-labs, Lannion, France
More informationHybrid Machine Learning Algorithms
Hybrid Machine Learning Algorithms Umar Syed Princeton University Includes joint work with: Rob Schapire (Princeton) Nina Mishra, Alex Slivkins (Microsoft) Common Approaches to Machine Learning!! Supervised
More informationCS 188: Artificial Intelligence. Machine Learning
CS 188: Artificial Intelligence Review of Machine Learning (ML) DISCLAIMER: It is insufficient to simply study these slides, they are merely meant as a quick refresher of the high-level ideas covered.
More informationCS 188: Artificial Intelligence Spring Announcements
CS 188: Artificial Intelligence Spring 2010 Lecture 24: Perceptrons and More! 4/22/2010 Pieter Abbeel UC Berkeley Slides adapted from Dan Klein Announcements W7 due tonight [this is your last written for
More informationCOMS 4721: Machine Learning for Data Science Lecture 20, 4/11/2017
COMS 4721: Machine Learning for Data Science Lecture 20, 4/11/2017 Prof. John Paisley Department of Electrical Engineering & Data Science Institute Columbia University SEQUENTIAL DATA So far, when thinking
More informationAbout Nnergix +2, More than 2,5 GW forecasted. Forecasting in 5 countries. 4 predictive technologies. More than power facilities
About Nnergix +2,5 5 4 +20.000 More than 2,5 GW forecasted Forecasting in 5 countries 4 predictive technologies More than 20.000 power facilities Nnergix s Timeline 2012 First Solar Photovoltaic energy
More informationAdvanced Click Models & their Applications to IR
Advanced Click Models & their Applications to IR (Afternoon block 2) Aleksandr Chuklin, Ilya Markov Maarten de Rijke a.chuklin@uva.nl i.markov@uva.nl derijke@uva.nl University of Amsterdam Google Switzerland
More informationIntroduction to Logistic Regression and Support Vector Machine
Introduction to Logistic Regression and Support Vector Machine guest lecturer: Ming-Wei Chang CS 446 Fall, 2009 () / 25 Fall, 2009 / 25 Before we start () 2 / 25 Fall, 2009 2 / 25 Before we start Feel
More information18.9 SUPPORT VECTOR MACHINES
744 Chapter 8. Learning from Examples is the fact that each regression problem will be easier to solve, because it involves only the examples with nonzero weight the examples whose kernels overlap the
More informationAn Algorithms-based Intro to Machine Learning
CMU 15451 lecture 12/08/11 An Algorithmsbased Intro to Machine Learning Plan for today Machine Learning intro: models and basic issues An interesting algorithm for combining expert advice Avrim Blum [Based
More informationMulticlass Classification-1
CS 446 Machine Learning Fall 2016 Oct 27, 2016 Multiclass Classification Professor: Dan Roth Scribe: C. Cheng Overview Binary to multiclass Multiclass SVM Constraint classification 1 Introduction Multiclass
More informationMIRA, SVM, k-nn. Lirong Xia
MIRA, SVM, k-nn Lirong Xia Linear Classifiers (perceptrons) Inputs are feature values Each feature has a weight Sum is the activation activation w If the activation is: Positive: output +1 Negative, output
More informationAdministration. CSCI567 Machine Learning (Fall 2018) Outline. Outline. HW5 is available, due on 11/18. Practice final will also be available soon.
Administration CSCI567 Machine Learning Fall 2018 Prof. Haipeng Luo U of Southern California Nov 7, 2018 HW5 is available, due on 11/18. Practice final will also be available soon. Remaining weeks: 11/14,
More informationOnline Learning to Rank with Top-k Feedback
Journal of Machine Learning Research 18 (2017) 1-50 Submitted 6/16; Revised 8/17; Published 10/17 Online Learning to Rank with Top-k Feedback Sougata Chaudhuri 1 Ambuj Tewari 1,2 Department of Statistics
More informationReinforcement Learning
Reinforcement Learning Markov decision process & Dynamic programming Evaluative feedback, value function, Bellman equation, optimality, Markov property, Markov decision process, dynamic programming, value
More informationWeb Search and Text Mining. Learning from Preference Data
Web Search and Text Mining Learning from Preference Data Outline Two-stage algorithm, learning preference functions, and finding a total order that best agrees with a preference function Learning ranking
More informationEvaluation Metrics. Jaime Arguello INLS 509: Information Retrieval March 25, Monday, March 25, 13
Evaluation Metrics Jaime Arguello INLS 509: Information Retrieval jarguell@email.unc.edu March 25, 2013 1 Batch Evaluation evaluation metrics At this point, we have a set of queries, with identified relevant
More informationarxiv: v1 [stat.ml] 31 Jan 2015
Sparse Dueling Bandits arxiv:500033v [statml] 3 Jan 05 Kevin Jamieson, Sumeet Katariya, Atul Deshpande and Robert Nowak Department of Electrical and Computer Engineering University of Wisconsin Madison
More informationIR Models: The Probabilistic Model. Lecture 8
IR Models: The Probabilistic Model Lecture 8 ' * ) ( % $ $ +#! "#! '& & Probability of Relevance? ' ', IR is an uncertain process Information need to query Documents to index terms Query terms and index
More informationLogistic Regression. Machine Learning Fall 2018
Logistic Regression Machine Learning Fall 2018 1 Where are e? We have seen the folloing ideas Linear models Learning as loss minimization Bayesian learning criteria (MAP and MLE estimation) The Naïve Bayes
More informationAd Placement Strategies
Case Study : Estimating Click Probabilities Intro Logistic Regression Gradient Descent + SGD AdaGrad Machine Learning for Big Data CSE547/STAT548, University of Washington Emily Fox January 7 th, 04 Ad
More informationCounterfactual Model for Learning Systems
Counterfactual Model for Learning Systems CS 7792 - Fall 28 Thorsten Joachims Department of Computer Science & Department of Information Science Cornell University Imbens, Rubin, Causal Inference for Statistical
More informationMachine Learning. Lecture 9: Learning Theory. Feng Li.
Machine Learning Lecture 9: Learning Theory Feng Li fli@sdu.edu.cn https://funglee.github.io School of Computer Science and Technology Shandong University Fall 2018 Why Learning Theory How can we tell
More informationOn the Foundations of Diverse Information Retrieval. Scott Sanner, Kar Wai Lim, Shengbo Guo, Thore Graepel, Sarvnaz Karimi, Sadegh Kharazmi
On the Foundations of Diverse Information Retrieval Scott Sanner, Kar Wai Lim, Shengbo Guo, Thore Graepel, Sarvnaz Karimi, Sadegh Kharazmi 1 Outline Need for diversity The answer: MMR But what was the
More informationMachine Learning. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 8 May 2012
Machine Learning Hal Daumé III Computer Science University of Maryland me@hal3.name CS 421 Introduction to Artificial Intelligence 8 May 2012 g 1 Many slides courtesy of Dan Klein, Stuart Russell, or Andrew
More informationCSE 417T: Introduction to Machine Learning. Final Review. Henry Chai 12/4/18
CSE 417T: Introduction to Machine Learning Final Review Henry Chai 12/4/18 Overfitting Overfitting is fitting the training data more than is warranted Fitting noise rather than signal 2 Estimating! "#$
More informationarxiv: v1 [cs.lg] 14 May 2014
Reducing Dueling Bandits to Cardinal Bandits arxiv:145.3396v1 [cs.lg] 14 May 214 Nir Ailon CS Dept. Technion Haifa, Israel nailon@cs.technion.ac.il Thorsten Joachims Cs Dept. Cornell Ithaca, NY tj@cs.cornell.edu
More informationMachine Learning (CS 567) Lecture 3
Machine Learning (CS 567) Lecture 3 Time: T-Th 5:00pm - 6:20pm Location: GFS 118 Instructor: Sofus A. Macskassy (macskass@usc.edu) Office: SAL 216 Office hours: by appointment Teaching assistant: Cheol
More informationBayesian Ranker Comparison Based on Historical User Interactions
Bayesian Ranker Comparison Based on Historical User Interactions Artem Grotov a.grotov@uva.nl Shimon Whiteson s.a.whiteson@uva.nl University of Amsterdam, Amsterdam, The Netherlands Maarten de Rijke derijke@uva.nl
More informationNeural networks and optimization
Neural networks and optimization Nicolas Le Roux INRIA 8 Nov 2011 Nicolas Le Roux (INRIA) Neural networks and optimization 8 Nov 2011 1 / 80 1 Introduction 2 Linear classifier 3 Convolutional neural networks
More informationInformation Retrieval
Introduction to Information CS276: Information and Web Search Christopher Manning and Pandu Nayak Lecture 15: Learning to Rank Sec. 15.4 Machine learning for IR ranking? We ve looked at methods for ranking
More information11. Learning To Rank. Most slides were adapted from Stanford CS 276 course.
11. Learning To Rank Most slides were adapted from Stanford CS 276 course. 1 Sec. 15.4 Machine learning for IR ranking? We ve looked at methods for ranking documents in IR Cosine similarity, inverse document
More informationUnbiased Learning to Rank with Unbiased Propensity Estimation
Unbiased Learning to Rank with Unbiased Propensity Estimation Qingyao Ai CICS, UMass Amherst Amherst, MA, USA aiqy@cs.umass.edu Keping Bi CICS, UMass Amherst Amherst, MA, USA kbi@cs.umass.edu Cheng Luo
More informationRETRIEVAL MODELS. Dr. Gjergji Kasneci Introduction to Information Retrieval WS
RETRIEVAL MODELS Dr. Gjergji Kasneci Introduction to Information Retrieval WS 2012-13 1 Outline Intro Basics of probability and information theory Retrieval models Boolean model Vector space model Probabilistic
More informationAlireza Shafaei. Machine Learning Reading Group The University of British Columbia Summer 2017
s s Machine Learning Reading Group The University of British Columbia Summer 2017 (OCO) Convex 1/29 Outline (OCO) Convex Stochastic Bernoulli s (OCO) Convex 2/29 At each iteration t, the player chooses
More informationMulti-Armed Bandits. Credit: David Silver. Google DeepMind. Presenter: Tianlu Wang
Multi-Armed Bandits Credit: David Silver Google DeepMind Presenter: Tianlu Wang Credit: David Silver (DeepMind) Multi-Armed Bandits Presenter: Tianlu Wang 1 / 27 Outline 1 Introduction Exploration vs.
More informationPredicting New Search-Query Cluster Volume
Predicting New Search-Query Cluster Volume Jacob Sisk, Cory Barr December 14, 2007 1 Problem Statement Search engines allow people to find information important to them, and search engine companies derive
More informationUpdating PageRank. Amy Langville Carl Meyer
Updating PageRank Amy Langville Carl Meyer Department of Mathematics North Carolina State University Raleigh, NC SCCM 11/17/2003 Indexing Google Must index key terms on each page Robots crawl the web software
More informationLecture 14 : Online Learning, Stochastic Gradient Descent, Perceptron
CS446: Machine Learning, Fall 2017 Lecture 14 : Online Learning, Stochastic Gradient Descent, Perceptron Lecturer: Sanmi Koyejo Scribe: Ke Wang, Oct. 24th, 2017 Agenda Recap: SVM and Hinge loss, Representer
More informationOnline Learning and Sequential Decision Making
Online Learning and Sequential Decision Making Emilie Kaufmann CNRS & CRIStAL, Inria SequeL, emilie.kaufmann@univ-lille.fr Research School, ENS Lyon, Novembre 12-13th 2018 Emilie Kaufmann Online Learning
More informationA parametric approach to Bayesian optimization with pairwise comparisons
A parametric approach to Bayesian optimization with pairwise comparisons Marco Co Eindhoven University of Technology m.g.h.co@tue.nl Bert de Vries Eindhoven University of Technology and GN Hearing bdevries@ieee.org
More informationOutline. Offline Evaluation of Online Metrics Counterfactual Estimation Advanced Estimators. Case Studies & Demo Summary
Outline Offline Evaluation of Online Metrics Counterfactual Estimation Advanced Estimators 1. Self-Normalized Estimator 2. Doubly Robust Estimator 3. Slates Estimator Case Studies & Demo Summary IPS: Issues
More informationThe Epoch-Greedy Algorithm for Contextual Multi-armed Bandits John Langford and Tong Zhang
The Epoch-Greedy Algorithm for Contextual Multi-armed Bandits John Langford and Tong Zhang Presentation by Terry Lam 02/2011 Outline The Contextual Bandit Problem Prior Works The Epoch Greedy Algorithm
More informationarxiv: v1 [cs.ir] 29 Sep 2014
Freshness-Aware Thompson Sampling Djallel Bouneffouf Orange Labs, 2, avenue Pierre Marzin, 22307 Lannion, France, Djallel.Bouneffouf}@Orange.com arxiv:1409.8572v1 [cs.ir] 29 Sep 2014 Abstract. To follow
More informationCounterfactual Learning-to-Rank for Additive Metrics and Deep Models
Counterfactual Learning-to-Rank for Additive Metrics and Deep Models Aman Agarwal Cornell University Ithaca, NY aman@cs.cornell.edu Ivan Zaitsev Cornell University Ithaca, NY iz44@cornell.edu Thorsten
More informationUniversität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen. Linear Classifiers. Blaine Nelson, Tobias Scheffer
Universität Potsdam Institut für Informatik Lehrstuhl Linear Classifiers Blaine Nelson, Tobias Scheffer Contents Classification Problem Bayesian Classifier Decision Linear Classifiers, MAP Models Logistic
More informationCPSC 340: Machine Learning and Data Mining. MLE and MAP Fall 2017
CPSC 340: Machine Learning and Data Mining MLE and MAP Fall 2017 Assignment 3: Admin 1 late day to hand in tonight, 2 late days for Wednesday. Assignment 4: Due Friday of next week. Last Time: Multi-Class
More informationCS 188: Artificial Intelligence Fall 2008
CS 188: Artificial Intelligence Fall 2008 Lecture 23: Perceptrons 11/20/2008 Dan Klein UC Berkeley 1 General Naïve Bayes A general naive Bayes model: C E 1 E 2 E n We only specify how each feature depends
More informationGeneral Naïve Bayes. CS 188: Artificial Intelligence Fall Example: Overfitting. Example: OCR. Example: Spam Filtering. Example: Spam Filtering
CS 188: Artificial Intelligence Fall 2008 General Naïve Bayes A general naive Bayes model: C Lecture 23: Perceptrons 11/20/2008 E 1 E 2 E n Dan Klein UC Berkeley We only specify how each feature depends
More informationTopic Models and Applications to Short Documents
Topic Models and Applications to Short Documents Dieu-Thu Le Email: dieuthu.le@unitn.it Trento University April 6, 2011 1 / 43 Outline Introduction Latent Dirichlet Allocation Gibbs Sampling Short Text
More informationSUPPORT VECTOR MACHINE
SUPPORT VECTOR MACHINE Mainly based on https://nlp.stanford.edu/ir-book/pdf/15svm.pdf 1 Overview SVM is a huge topic Integration of MMDS, IIR, and Andrew Moore s slides here Our foci: Geometric intuition
More informationFoundations of Machine Learning
Introduction to ML Mehryar Mohri Courant Institute and Google Research mohri@cims.nyu.edu page 1 Logistics Prerequisites: basics in linear algebra, probability, and analysis of algorithms. Workload: about
More informationStatistical Learning Theory: Generalization Error Bounds
Statistical Learning Theory: Generalization Error Bounds CS6780 Advanced Machine Learning Spring 2015 Thorsten Joachims Cornell University Reading: Murphy 6.5.4 Schoelkopf/Smola Chapter 5 (beginning, rest
More informationThe Perceptron Algorithm, Margins
The Perceptron Algorithm, Margins MariaFlorina Balcan 08/29/2018 The Perceptron Algorithm Simple learning algorithm for supervised classification analyzed via geometric margins in the 50 s [Rosenblatt
More informationLearning to Rank and Quadratic Assignment
Learning to Rank and Quadratic Assignment Thomas Mensink TVPA - XRCE & LEAR - INRIA Grenoble, France Jakob Verbeek LEAR Team INRIA Rhône-Alpes Grenoble, France Abstract Tiberio Caetano Machine Learning
More informationSupport vector machines Lecture 4
Support vector machines Lecture 4 David Sontag New York University Slides adapted from Luke Zettlemoyer, Vibhav Gogate, and Carlos Guestrin Q: What does the Perceptron mistake bound tell us? Theorem: The
More informationarxiv: v1 [cs.ir] 22 Dec 2012
Learning the Gain Values and Discount Factors of DCG arxiv:22.5650v [cs.ir] 22 Dec 202 Ke Zhou Dept. of Computer Science and Engineering Shanghai Jiao-Tong University No. 800, Dongchuan Road, Shanghai,
More informationA Latent Variable Graphical Model Derivation of Diversity for Set-based Retrieval
A Latent Variable Graphical Model Derivation of Diversity for Set-based Retrieval Keywords: Graphical Models::Directed Models, Foundations::Other Foundations Abstract Diversity has been heavily motivated
More informationHidden Markov Models (HMM) and Support Vector Machine (SVM)
Hidden Markov Models (HMM) and Support Vector Machine (SVM) Professor Joongheon Kim School of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea 1 Hidden Markov Models (HMM)
More informationPROBABILITY AND INFORMATION THEORY. Dr. Gjergji Kasneci Introduction to Information Retrieval WS
PROBABILITY AND INFORMATION THEORY Dr. Gjergji Kasneci Introduction to Information Retrieval WS 2012-13 1 Outline Intro Basics of probability and information theory Probability space Rules of probability
More informationDisconnecting Networks via Node Deletions
1 / 27 Disconnecting Networks via Node Deletions Exact Interdiction Models and Algorithms Siqian Shen 1 J. Cole Smith 2 R. Goli 2 1 IOE, University of Michigan 2 ISE, University of Florida 2012 INFORMS
More information