Object Exchangeability in Reinforcement Learning: Extended Abstract

05/07/2019
by   John Mern, et al.
0

Although deep reinforcement learning has advanced significantly over the past several years, sample efficiency remains a major challenge. Careful choice of input representations can help improve efficiency depending on the structure present in the problem. In this work, we present an attention-based method to project inputs into an efficient representation space that is invariant under changes to input ordering. We show that our proposed representation results in a search space that is a factor of m! smaller for inputs of m objects. Our experiments demonstrate improvements in sample efficiency for policy gradient methods on a variety of tasks. We show that our representation allows us to solve problems that are otherwise intractable when using naive approaches.

READ FULL TEXT

page 1

page 2

page 3

research
03/19/2020

Exchangeable Input Representations for Reinforcement Learning

Poor sample efficiency is a major limitation of deep reinforcement learn...
research
11/30/2017

Comparing Deep Reinforcement Learning and Evolutionary Methods in Continuous Control

Reinforcement learning and evolutionary strategy are two major approache...
research
08/17/2018

Importance mixing: Improving sample reuse in evolutionary policy search methods

Deep neuroevolution, that is evolutionary policy search methods based on...
research
11/18/2017

Run, skeleton, run: skeletal model in a physics-based simulation

In this paper, we present our approach to solve a physics-based reinforc...
research
06/01/2020

Neural Architecture Search with Reinforce and Masked Attention Autoregressive Density Estimators

Neural Architecture Search has become a focus of the Machine Learning co...
research
07/11/2019

Imitation-Projected Policy Gradient for Programmatic Reinforcement Learning

We present Imitation-Projected Policy Gradient (IPPG), an algorithmic fr...
research
06/09/2021

Reinforcement Learning for Industrial Control Network Cyber Security Orchestration

Defending computer networks from cyber attack requires coordinating acti...

Please sign up or login with your details

Forgot password? Click here to reset