1 Introduction
Bayesian optimization is a framework for global optimization of a black box function via noisy evaluations (Frazier, 2018), and provides an alternative to simulated annealing Kirkpatrick et al. (1983); Bertsimas and Tsitsiklis (1993) or exhaustive search Davis (1991)
. These methods have proven adept at hyperparameter tuning of machine learning models
Snoek et al. (2012); Li et al. (2017), nonlinear system identification Srivastava et al. (2013), experimental design Chaloner and Verdinelli (1995); Press (2009), and semantic mapping Shotton et al. (2008).More specifically, denote the function we seek to optimize through noisy samples, i.e., for a given choice , we observe sequentially. We make no assumptions for now on the convexity, smoothness, or other properties of , other than each function evaluation must be selected judiciously. Our goal is to select a sequence of actions that eventuates in competitive performance with respect to the optimal selection . For sequential decision making, a canonical performance metric is regret, which quantifies the performance of a sequence of decisions as compared with the optimal :
(1.1) 
Regret in (1.1) is natural because at each time we quantify how far decision was from optimal through the difference . An algorithm eventually learns the optimal strategy if it is noregret: as .
In this work, we focus on Bayesian optimization, which hypothesizes a likelihood on the relationship between the unknown function and action selection . Then upon selecting an action , one tracks a posterior distribution, or belief model Powell and Ryzhov (2012), over possible outcomes
which informs how the next action is selected. In classical Bayesian inference, posterior distributions do not influence which samples
are observed next Ghosal et al. (2000). In contrast, in multiarmed bandits, action selection determines which observations form the posterior, which is why it is also referred to as active learning Jamieson et al. (2015).Two key questions in this setting are how to specify a (i) likelihood and (ii) action selection strategy. These specifications come with their own merits and drawbacks in terms of optimality and computational efficiency. Regarding (i) the likelihood model, when the action space is discrete and of moderate size
, one may track a probability for each element of
, as in Thompson (posterior) sampling Russo et al. (2018), Gittins indices Gittins et al. (2011), and the Upper Confidence Bound (UCB) Auer et al. (2002). These methods differ in their manner of action selection, but not distributional representation.
However, when the range of possibilities is large, computational challenges arise. This is because the number of parameters one needs to define a posterior distribution over is proportional to
, an instance of the curse of dimensionality in nonparametric statistics. One way to circumvent this issue for continuous spaces is to discretize the action space according to a predefined timehorizon that determines the total number of selected actions
Bubeck et al. (2011); Magureanu et al. (2014), and carefully tune the discretization to the timehorizon . The drawback of these approaches is that as , the number of parameters in the posterior grows intractably large.An alternative is to define a historydependent distribution directly over the large (possibly continuous) space using, e.g., Gaussian Processes (GPs) Rasmussen (2004) or Monte Carlo (MC) methods Smith (2013). Bandit action selection strategies based on such distributional representations have been shown to be noregret in recent years – see Srinivas et al. (2012); Gopalan et al. (2014). While MC methods permit the most general priors on the unknown function , computational and technical challenges arise when the prior/posterior no longer posses conjugacy properties Gopalan et al. (2014). By contrast, GPs, stochastic processes with any finite collection of realizations of which are jointly Gaussian Krige (1951)
, have a conjugate prior and posterior, and thus their parametric updates admit a closed form – see
Rasmussen (2004)[Ch. 2].The conjugacy of GPs has driven their use in bandit action selection. In particular, by connecting regret to maximum informationgain based exploration, which may be quantified by variance
Srinivas et al. (2012); De Freitas et al. (2012), noregret algorithms may be derived through variance maximization. Doing so yields actions which overprioritize exploration, which may be balanced through, e.g., upperconfidence bound (UCB) based action selection. GPUCB algorithms, and variants such as expected improvement (EI) Wang and de Freitas (2014); Nguyen et al. (2017), and stepwise uncertainty reduction (SUR) Villemonteix et al. (2009), including knowledge gradient Frazier et al. (2008), have been shown to be noregret or statistically consistent Bect et al. (2019) in recent years.However, these convergence results hinge upon requiring use of the dense GP whose posterior distribution [cf. (2.7)], has complexity cubic in due to the inversion of a Gram (kernel) matrix formed from the entire training set. Numerous efforts to reduce the complexity of GPs exist in the literature – see Csató and Opper (2002); Bauer et al. (2016); Bui et al. (2017). These methods all fix the complexity of the posterior and “project” all additional points onto a fixed likelihood “subspace.” Doing so, however, may cause uncontrollable statistical bias and divergence. In this work, we seek to explicitly design GPs to ensure both small regret and complexity which remains under control.
Contributions. In this context, we propose a statistical test for the GP that explicitly trades off memory and regret (1.1), motivated by compression routines that permit flexible representational complexity of nonparametric models Koppel (2019); Elvira et al. (2016). Specifically, we:

derive sublinear regret bounds of GP bandit algorithms up to factors depending on the compression parameter for both discrete and continuous action sets (Sec. 3).

establish that the complexity of the GP posterior remains provably finite (Sec. 3).

experimentally employ these approaches for optimizing nonconvex functions and tuning the regularizer and stepsize of a logistic regressor, which obtains a state of the art trade off in regret versus computational efficiency relative to a few baselines. (Sec. 4).
2 Gaussian Process Bandits
Information Gain and UpperConfidence Bound: To find when is unknown, one may first globally approximate well, and then evaluate it at the maximizer. In order to formalize this approach, we propose to quantify how informative a collection of points is through information gain (Cover and Thomas, 2012), a standard quantity that tracks the mutual information between and observations all indices in some sampling set, defined as
(2.1) 
where denotes the entropy of observations and denotes the entropy conditional on . For a Gaussian with mean and covariance , the entropy is given as
(2.2) 
which allows us to evaluate the information gain in closed form as
(2.3) 
Suppose we are tasked with finding a subset of points that maximize the information gain. This amounts to a challenging subset selection problem whose exact solution cannot be found in polynomial time (Ko et al., 1995). However, nearoptimal solutions may be obtained via greedy maximization, as information gain is submodular (Krause et al., 2008). Maximizing information gain, i.e., selecting , is equivalent to (Srinivas et al., 2012)
(2.4) 
where
is the empirical standard deviation associated with a matrix
of data points . We note that (2.4) may be shown to obtain the nearoptimal selection of points in the sense that after rounds, executing (2.4) guaranteesfor some points via the theory of submodular functions (Nemhauser et al., 1978). Indeed, selecting points based upon (2.4) permits one to efficiently explore globally. However, it dictates that action selection does not move towards the actual maximizer of . For this, should be chosen according to prior knowledge about the function , exploiting information about where is large. To balance between these two extremes, a number of different acquisition functions are possible based on the GP posterior – see (Powell and Ryzhov, 2012). Here, for simplicity, we propose to do so either based upon the upperconfidence bound (UCB):
(2.5) 
with as an exploration parameter , or the expected improvement (EI) (Nguyen et al., 2017), defined as
(2.6) 
where is the maximum observation value of past data, is the score of , and and
denote the density and distribution function of a standard Gaussian distribution. Moreover, the aforementioned mean
and standard deviation in the preceding expressions are computed via a GP, to be defined next.Gaussian Processes: A Gaussian Process (GP) is a stochastic process for which every finite collection of realizations is jointly Gaussian. We hypothesize a Gaussian Process prior for , which is specified by a mean function
and covariance kernel defined as
Subsequently, we assume the prior is zeromean . GPs play multiple roles in this work: as a way of specifying smoothness and a prior for unknown function , as well as characterizing regret when is a sample from a known GP . GPs admit a closed form for their conditional a posteriori mean and covariance given training set as (Rasmussen, 2004)[Ch. 2].
(2.7)  
where denotes the empirical kernel map and denotes the gram matrix of kernel evaluations whose entries are for . The subscript underscores its role in parameterizing the mean and covariance. Further, note that (2.7) depends upon a linear observation model with Gaussian noise prior . The parametric updates (2.7) depend on past actions , which causes the kernel dictionary to grow by one at each iteration, i.e.,
and the posterior at time uses all past observations . Henceforth, the number of columns in the dictionary is called the model order. The GP posterior at time has model order .
The resulting action selection strategy (2.5) using the GP (2.7) is called GPUCB, and its regret (1.1) is established in (Srinivas et al., 2012)[Theorem 1 and 2] as sublinear with high probability up to factors depending on the maximum information gain over points, which is defined as
(2.8) 
Compression Statistic: The fundamental role of information gain in the regret of GP, using either UCB or EI, provides a conceptual basis for finding a parsimonious GP posterior that nearly preserves noregret properties of (2.5)  (2.7). To define our compression rule, first we define some key quantities related to approximate GPs. Suppose we select some other kernel dictionary rather than at time , where is the model order of the Gaussian Process. Then, the only difference is that the kernel matrix in (2.7) and the empirical kernel map are substituted by and , respectively, where the entries of and . Further, denotes the subvector of associated with only the indices of training points in matrix . We denote the training subset associated with these indices as . By rewriting (2.7) with as the dictionary rather than , we obtain
(2.9)  
The question, then, is how to select a sequence of dictionaries whose columns comprise a subset of those of in such a way to approximately preserve the regret bounds of (Srinivas et al., 2012)[Theorem 1 and 2] while ensuring the model order is moderate .
We propose using conditional entropy as a statistic to compress against, i.e., a new data point should be appended to the Gaussian process posterior only when its conditional entropy is at least , which results in the following update rule for the dictionary :
else  
(2.10) 
where we define as the compression budget. This amounts to a statistical test of whether the action yielded an informative sample in the sense that its conditional entropy exceeds an threshold. Therefore, uninformative past decisions are dropped from belief formation about the present. The modification of GPUCB, called Compressed GPUCB, or CUB for short, uses (2.5) with the lazy GP belief model (2.9) defined by dictionary updates (2). Similarily, the compression version of EI is called Compressed EI or CEI for short. We present them together for simplicity as Algorithm 1 with the understanding that in practice, one must specify UCB (2.5) or EI (2.6). Next, we rigorously establish how Algorithm 1 trades off regret and memory through the threshold on conditional entropy for whether a point should be included in the GP.
3 Balancing Regret and Complexity
In this section, we establish that Algorithm 1 attains comparable regret (1.1) to the standard GP approach to bandit optimization under the canonical settings of the action space being a discrete finite set and a continuous compact Euclidean subset, when actions follow the upperconfidence bound (2.5). We further establish sublinear regret of the expected improvement (2.6) when the action section is discrete. We build upon techniques pioneered in (Srinivas et al., 2012; Nguyen et al., 2017). The points of departure in our analysis are: (i) the characterization of statistical bias induced by the compression rule (2) in the regret bounds, and (ii) the relating of properties of the posterior (2) and action selections (2.5)(2.6) to topological properties of the action space to ensure the model order of the GP defined by (2.9) is atworst finite for all . Next we present the regret performance of Algorithm 1 when actions are selected according to the UCB (2.5).
Theorem 3.1.
(Regret of Compressed GPUCB) Fix and suppose the Gaussian Process prior for has zero mean with covariance kernel . Define constant Then under the following parameter selections and conditions on the data domain , we have:

(Finite decision set) For finite cardinality , with exploration parameter selected as
the accumulated regret is sublinear regret with probability .
(3.1) where is the compression budget.

(General decision set) For continuous set , assume the derivative of the GP sample paths are bounded with high probability, i.e., for constants ,
(3.2) Then, under exploration parameter
the accumulated regret is
(3.3)
Theorem 3.1, whose proof is the supplementary material attached to the submission, establishes that Algorithm 1 with action selected according to (2.5) attains sublinear regret with high probability when the action space is discrete and finite, as well as when it is a continuous compact subset of Euclidean space, up to factors depending on the maximum information gain (2.8) and the compression budget in (2). The sublinear dependence of the information gain on in terms of the parameter dimension is derived in (Srinivas et al., 2012)[Sec. VB] for common kernels such as the linear, Gaussian, and Matérn.
The proof follows a path charted in (Srinivas et al., 2012)
[Appendix I], except that we must contend with the compressioninduced error. Specifically, we begin by computing the confidence interval for each action
taken by the proposed algorithm at time . Then, we bound the instantaneous regret in terms of the problem parameters such as , , , compression budget , and information gainusing the fact that the upperconfidence bound overshoots the maximizer. By summing over time with CauchySchwartz, we build an upperestimate of cumulative regret based on instantaneous regret
. Unsurprisingly, an additional term appears due to our compression budget in the final regret bounds, which for reduces to (Srinivas et al., 2012)[Theorem 1 and 2]. However, rather than permitting the complexity of the GP to grow unbounded with , instead it grows only when informative actions are taken, and preserves the sublinear growth of regret for any such that such as for any .Next, we analyze the performance of Algorithm 1 when actions are selected according to the expected improvement (2.6).
Theorem 3.2.
(Regret of Compressed GPEI) Suppose we select actions based upon Expected Improvement (2.6) together with the conditional entropybased rule (2) for retaining past points into the GP posterior, as detailed in Algorithm 1. Then, under the same conditions and parameter selection as in Theorem 3.1, when is a finite discrete set, the regret is sublinear with probability , i.e.,
(3.4) 
where
is the maximum value of the score, is as defined in Lemma 9.7.
The proof is proved in Appendix 9. In Theorem 3.2, we have characterized how the regret of Algorithm 1 depends on the compression budget for when the actions are selected according to the EI rule. We note (3.4) holds for the discrete action space . The result for the continuous action space follows from the proof of statement ii of Theorem (3.1) and the proof of Theorem 3.2. The proof of Theorem 3.2 follows a similar path presented in the Nguyen et al. (2017). We start by upper bounding the instantaneous improvements achieved by the proposed compressed EI algorithm in terms of the acquisitions function in Lemma 9.3. Further, the sum of the predictive variances for the compressed version over instances is upper bounded in terms of the maximum information gain in Lemma 9.5. Then we upper bound the cumulative sum of the instantaneous regret in terms of the model parameters such as , , , , and . Similar to the analysis that gives rise to Theorem 3.1, an additional term arises due to compressioninduced error, which explicitly trades off regret and complexity. Moreover, note that reduces to the result of Nguyen et al. (2017).
Next, we establish the main merit of doing this statistical test inside a bandit algorithm is that it controls the complexity of the belief model that decides action selections. In particular, Theorem 3.3 formalizes that the dictionary defined by (2) in Algorithm 1 will always have finite number of elements even if , which is stated next.
Theorem 3.3.
Suppose that the conditional entropy is bounded for all . Then, the number of elements in the dictionary denoted by in the GP posterior of Algorithm 1 is finite as for fixed compression threshold .
The implications of Theorem 3.3 are that Algorithm 1 only retains significant actions in belief formation and drops extraneous points. Interestingly, this result states that despite infinitely many actions being taken in the limit, only finite many of them are informative. In principle, one could make adaptive with to improve performance, but analyzing such a choice becomes complicated as relating the worstcast model complexity to the covering number of the space would then depend on variable sets whose conditional entropy is at least . In the next section, we evaluate the merit of these conceptual results on experimental settings involving black box nonconvex optimization and hyperparameter tuning of linear logistic regressors.
4 Experiments
In this section, we evaluate the performance of the statistical compression method under a few different action selections (acquisition functions). Specifically, Algorithm 1 employs the Upper Confidence Bound (UCB) or Expected Improvement (EI) (Nguyen et al., 2017) acquisition function, but the key insight here is a modification of the GP posterior, not the action selection. Thus, we validate its use for Most Probable Improvement (MPI) (Wang and de Freitas, 2014) as well, defined as
where and denote the standard Gaussian density and distribution functions, and is the centered score. We further compare the compression scheme against Budgeted Kernel Bandits (BKB) proposed by (Calandriello et al., 2019) which proposes to randomly add or drop points according to a distribution that is inversely proportional to the posterior variance, also on the aforementioned acquisition functions.
Unless otherwise specified, the squared exponential kernel is used to represent the correlation between the input, the lengthscale is set to = 1.0, the noise prior is set to = 0.001, the compression budget = and the confidence bounds hold with probability of at least = 0.9. As a common practice across all three problems, we initialize the Gaussian priors with training data randomly collected from the input domain, where d is the input dimension. We quantify the performance using Mean Average Regret over the iterations and the clock time. In addition, the model order, or number of points defining the GP posterior, is visualized over time to characterize the compression of the training dictionary. To ensure fair evaluations, all the listed simulations were performed on a PC with 1.8 GHz Intel Core i7 CPU and 16 GB memory. Same initial priors and parameters are used to assess computational efficiency in terms of the compression.
Acquisition  Uncompressed  Compressed  BKB 

UCB  6.756  5.335  9.56 
EI  7.594  4.133  10.578 
MPI  5.199  3.864  9.429 
4.1 Example function
Firstly, we evaluate our proposed method on an example function given by Equation 4.1
(4.1) 
A random Gaussian noise is induced at every observation of f, to emulate the practical applications of Bayesian Optimization where the black box functions are often corrupted by noise.
The results of this experiment are shown in Figure 1, and the associated wall clock times are demonstrated in Table 1. Observe that the compression rule (2) yields regret that is typically comparable to the dense GP, with orders of magnitude reduction in model complexity. This complexity reduction, in turn, permits a state of the art tradeoff in regret versus wall clock time for certain acquisition functions, i.e., the UCB and EI, but not MPI. Interestingly, the model complexity of Algorithm 1 settles to a constant discerned by the covering number (metric entropy) of the action space, validating the conceptual result of Theorem 3.3.
4.2 Rosenbrock Function
For the second experiment, we compare the compressed variants with their baseline algorithm on a twodimensional nonconvex function popularly known as the Rosenbrock Function, given by:
(4.2) 
The Rosenbrock function is a common benchmark nonconvex function used to validate the performance of global optimization methods. Here we set its parameters as and for simplicity throughout. Again, we run various (dense and reducedorder) Gaussian Process bandit algorithms with different acquisition functions.
The results of this experiment are displayed in Figure 2 with associated wall clock times collected in Table 2. Again, we observe that compression with respect to conditional entropy yields a minimal reduction in performance in terms of regret while translating to a significant reduction of complexity. Specifically, rather than growing linearly with the number of past actions, as is standard in nonparametric statistics, the model order settles down to an intrinsic constant determined by the metric entropy of the action space. This means that we obtain a state of the art tradeoff in model complexity versus regret, as compared with the dense GP or probabilistic dropping inversely proportional to the variance, as in (Calandriello et al., 2019).
Acquisition  Uncompressed  Compressed  BKB 

UCB  2.412  1.905  3.143 
EI  2.604  2.246  3.801 
MPI  2.533  2.186  3.237 
4.3 Hyperparamter Tuning in Logistic Regression
In this subsection, we propose using bandit algorithms to automate the hyperparameter tuning of machine learning algorithms. More specifically, we propose using Algorithm 1
and variants with different acquisition functions to tune the following hyperparameters of a supervised learning scheme, whose concatenation forms the action space: the learning rate, batch size, dropout of the inputs, and the
regularization constant. The specific supervised learning problem we focus on is the training of a multiclass logistic regressor over the MNIST training set LeCun and Cortes (2010)for classifying hand written digits. The instantaneous reward here is the statistical accuracy on a holdout validation set.
Acquisition  Uncompressed  Compressed  BKB 

UCB  5.18  5.288  4.836 
EI  5.948  5.611  4.82 
MPI  5.642  4.99  4.867 
Clock Times (in seconds) with Hyperparameter Tuning
Considering the highdimensional input domain and the number of training examples, GP dictionary may explode to a large size. In largescale settings, the input space could be much larger with many more hyperparameters to tune, in which case GPs may be computationally intractable. The statistical compression proposed here ameliorates this issue by keeping the size of training dictionary in check, which makes it feasible for hyperparameter tuning as the number of training examples becomes large.
The results of this implementation are given in Figure 3 with associated compute times in Table 3. Observe that the trend identified in the previous two examples translates into practice here: the compression technique (2) yields algorithms whose regret is comparable to the dense GP, with a significant reduction in model complexity that eventually settles to a constant. This constant is a fundamental measure of the complexity of the action space required for finding a noregret policy. Overall, then, one can run Algorithm 1 on the backend of any training scheme for supervised learning in order to automate the selection of hyperparameters in perpetuity without worrying about eventual slowdown.
5 Conclusions
We considered bandit problems whose action spaces are discrete but have large cardinality, or are continuous. The canonical performance metric, regret, quantifies how well bandit action selection is against a best comparator in hindsight. By connecting regret to maximum informationgain based exploration which may be quantified by variance, one may find noregret algorithms through variance maximization. Doing so yields actions which overprioritize exploration. To balance between exploration and exploitation, that is, moving towards the optimum in finite time, we focused on upperconfidence bound based action selection. Following a number of previous works for bandits with large action spaces, we parameterized the action distribution as a Gaussian Process in order to have a closed form expression for the a posteriori variance.
Unfortunately, Gaussian Processes exhibit complexity challenges when operating ad infinitum: the complexity of computing posterior parameters grows cubically with the time index. While numerous previous memoryreduction methods exist for GPs, designing compression for bandit optimization is relatively unexplored. Within this gap, we proposed a compression rule for the GP posterior explicitly derived by informationtheoretic regret bounds, where the conditional entropy encapsulates the perstep progress of the bandit algorithm. This compression only includes past actions whose conditional entropy exceeds an threshold to enter into the posterior.
As a result, we derived explicit tradeoffs between model complexity and informationtheoretic regret. Moreover, the complexity of the resulting GP posterior is at worst finite and depends on the covering number (metric entropy) of the action space, a fundamental constant that determines the bandit problem’s difficulty. In experiments, we observed a favorable tradeoff between regret, model complexity, and iteration index/clock time for a couple toy nonconvex optimization problems as well as the actual problem of how to tune hyperparameters of a supervised machine learning model.
Future directions include extensions to nonstationary bandit problems, generalizations to historydependent action selection strategies such as stepwise uncertainty reduction methods (Villemonteix et al., 2009)
, and informationtheoretic compression of deep neural networks based on bandit algorithms.
References
 The nonstochastic multiarmed bandit problem. SIAM journal on computing 32 (1), pp. 48–77. Cited by: §1.
 Understanding probabilistic sparse gaussian process approximations. In Advances in neural information processing systems, pp. 1533–1541. Cited by: §1.
 A supermartingale approach to gaussian process based sequential design of experiments. Bernoulli 25 (4A), pp. 2883–2919. Cited by: §1.
 Simulated annealing. Statistical Science 8 (1), pp. 10–15. Cited by: §1.
 Lipschitz bandits without the lipschitz constant. In International Conference on Algorithmic Learning Theory, pp. 144–158. Cited by: §1.
 Streaming sparse gaussian process approximations. In Advances in Neural Information Processing Systems, pp. 3301–3309. Cited by: §1.
 Gaussian process optimization with adaptive sketching: scalable and no regret. In Conference on Learning Theory, pp. 533–557. Cited by: §4.2, §4.
 Bayesian experimental design: a review. Statistical Science, pp. 273–304. Cited by: §1.
 Elements of information theory. John Wiley & Sons. Cited by: §2, §7.1.
 Sparse online gaussian processes. Neural computation 14 (3), pp. 641–668. Cited by: §1.

Handbook of genetic algorithms
. Cited by: §1.  Exponential regret bounds for gaussian process bandits with deterministic observations. arXiv preprint arXiv:1206.6457. Cited by: §1.
 Adapting the number of particles in sequential monte carlo methods through an online scheme for convergence assessment. IEEE Transactions on Signal Processing 65 (7), pp. 1781–1794. Cited by: §1.
 The kernel recursive leastsquares algorithm. IEEE Transactions on Signal Processing 52 (8), pp. 2275–2285. External Links: Document, ISSN 19410476 Cited by: §8.
 A knowledgegradient policy for sequential information collection. SIAM Journal on Control and Optimization 47 (5), pp. 2410–2439. Cited by: §1.
 A tutorial on bayesian optimization. arXiv preprint arXiv:1807.02811. Cited by: §1.
 Convergence rates of posterior distributions. Annals of Statistics 28 (2), pp. 500–531. Cited by: §1.
 Multiarmed bandit allocation indices. John Wiley & Sons. Cited by: §1.
 Thompson sampling for complex online problems. In International Conference on Machine Learning, pp. 100–108. Cited by: §1.
 Next: a system for realworld development, evaluation, and application of active learning. In Advances in neural information processing systems, pp. 2656–2664. Cited by: §1.
 Optimization by simulated annealing. science 220 (4598), pp. 671–680. Cited by: §1.
 An exact algorithm for maximum entropy sampling. Operations Research 43 (4), pp. 684–691. Cited by: §2.
 Consistent online gaussian process regression without the sample complexity bottleneck. In 2019 American Control Conference (ACC), pp. 3512–3518. Cited by: §1.
 Nearoptimal sensor placements in gaussian processes: theory, efficient algorithms and empirical studies. Journal of Machine Learning Research 9 (Feb), pp. 235–284. Cited by: §2.
 A statistical approach to some basic mine valuation problems on the witwatersrand. Journal of the Southern African Institute of Mining and Metallurgy 52 (6), pp. 119–139. Cited by: §1.
 MNIST handwritten digit database. Note: http://yann.lecun.com/exdb/mnist/ External Links: Link Cited by: §4.3.
 Hyperband: a novel banditbased approach to hyperparameter optimization. The Journal of Machine Learning Research 18 (1), pp. 6765–6816. Cited by: §1.
 Lipschitz bandits: regret lower bounds and optimal algorithms. In COLT 2014, Cited by: §1.
 An analysis of approximations for maximizing submodular set functions?i. Mathematical programming 14 (1), pp. 265–294. Cited by: §2.
 Regret for expected improvement over the bestobserved value and stopping condition. In Asian Conference on Machine Learning, pp. 279–294. Cited by: §1, §2, §3, §3, §4, §9.1, §9.1, §9.1, §9.1, §9.1, §9.2.
 Optimal learning. Vol. 841, John Wiley & Sons. Cited by: §1, §2.
 Bandit solutions provide unified ethical models for randomized clinical trials and comparative effectiveness research. Proceedings of the National Academy of Sciences 106 (52), pp. 22387–22392. Cited by: §1.
 Gaussian processes in machine learning. In Advanced lectures on machine learning, pp. 63–71. Cited by: §1, §2.
 A tutorial on thompson sampling. Foundations and Trends® in Machine Learning 11 (1), pp. 1–96. Cited by: §1.

Semantic texton forests for image categorization and segmentation.
In
2008 IEEE Conference on Computer Vision and Pattern Recognition
, pp. 1–8. Cited by: §1.  Sequential monte carlo methods in practice. Springer Science & Business Media. Cited by: §1.
 Practical bayesian optimization of machine learning algorithms. In Advances in neural information processing systems, pp. 2951–2959. Cited by: §1.
 Informationtheoretic regret bounds for gaussian process optimization in the bandit setting. IEEE Transactions on Information Theory 58 (5), pp. 3250–3265. Cited by: §1, §1, §2, §2, §2, §3, §3, §3, item ii, §9.1.
 On optimal foraging and multiarmed bandits. In 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 494–499. Cited by: §1.
 An informational approach to the global optimization of expensivetoevaluate functions. Journal of Global Optimization 44 (4), pp. 509. Cited by: §1, §5.
 Theoretical analysis of bayesian optimisation with unknown gaussian process hyperparameters. arXiv preprint arXiv:1406.7758. Cited by: §1, §4.
Supplementary Material for
“Efficient Gaussian Process Bandits by Believing only Informative Actions”
6 Preliminaries
Before proceeding with the proofs in detail, we define some notation to clarify the exposition. For instance, in the analysis, it is important to differentiate the actions taken by the standard (uncompressed) GPUCB algorithm defined by (2.5)  (2.7) from that of Algorithm 1 which employs information gainbased compression. Therefore, we proposed the following notations.
We further rewrite the proposed Algorithm 1 here in Algorithm 2 utilizing this notation.
Subsequently, we pursue proofs in terms of the aforementioned definitions.
7 Proof of Theorem 3.1
The statement of Theorem 3.1 is divided into two parts for finite decision set (statement (i)) and compact convex action space (statement (ii)). Next, we present the proof for both the statements separately.
7.1 Proof of Theorem 3.1 statement (i)
The proof of Theorem 3.1(i) is based on upper bounding the difference in terms of a scaled version of the standard deviation , which we state next.
Lemma 7.1.
Choose and let , for some such that . Then, the parameters of the approximate GP posterior in Algorithm 1 satisfies
(7.1) 
holds with probability at least .
Proof.
At each , we have dictionary which contains the data points (actions takes so far) for the function . For a given and , . In Algorithm 2), we take actions and observe which are different from and of the uncompressed bandit algorithm [cf. (2.5)  (2.7)].
Hence, are the parameters of a Gaussian whose entropy is given by . This Gaussian is parametrized by the collection of data points . At , we take an action after which we observe . Then, we check for the conditional entropy . If the conditional entropy is higher than then we update the GP distribution, otherwise not (2). Hence, there is a fundamental difference between the posterior distributions and action selections. We seek to analyze the performance of the proposed algorithm in terms the regret defined against the optimal
. To do so, we explot some properties of the Gaussian, specifically, for random variable
, the cumulative density function can be expresssed(7.2)  
For and , we have that . Furthermore, the integral term scaled by resembles the Gaussian density integrated from to for a random variable with mean and unit standard deviation, integrated to . Therefore, we get
(7.3) 
Using the expression and for some sequence of nonnegative scalars . Substituting this expression into the lefthand side of (7.2) using the lefthand side of (7.3), we obtain
(7.4) 
Now apply Boole’s inequality to the preceding expression to write
(7.5) 
To obtain the result in the statement of Lemma 7.1, select the constant sequence such that , with scalar parameter sequence . Applying Boole’s inequality again over all time points , we get
(7.6) 
The last equality is true since . We reverse the inequality to obtain an upper bound on the absolute difference between the true function and the estimated mean function for all and such that
(7.7) 
holds with probability , as stated in Lemma 7.1. ∎
Lemma 7.2.
Fix . If for all , the instantaneous regret is bounded as
(7.8) 
Proof.
Since Algorithm 2 chooses the next sampling point at each step, we have
(7.9) 
by the definition of the maximum, where is the optimal point. The instantaneous regret is then bounded as
(7.10) 
But from Lemma 7.1 we have that holds with probability . This implies that
(7.11) 
Then, (7.11) quantifies the instantaneous regret of action taken by Algorithm 2, as stated in Lemma 7.2. ∎
Lemma 7.3.
The information gain of actions selected by Algorithm 1, denoted as , admits a closed from in terms of the posterior variance of the compressed GP and the variance of the noise prior as
Comments
There are no comments yet.