Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

The Dependent Doors Problem: An Investigation into Sequential Decisions without Feedback

Published: 21 August 2018 Publication History

Abstract

We introduce the dependent doors problem as an abstraction for situations in which one must perform a sequence of dependent decisions, without receiving feedback information on the effectiveness of previously made actions. Informally, the problem considers a set of d doors that are initially closed, and the aim is to open all of them as fast as possible. To open a door, the algorithm knocks on it, and it might open or not according to some probability distribution. This distribution may depend on which other doors are currently open, as well as on which other doors were open during each of the previous knocks on that door. The algorithm aims to minimize the expected time until all doors open. Crucially, it must act at any time without knowing whether or which other doors have already opened. In this work, we focus on scenarios where dependencies between doors are both positively correlated and acyclic.
The fundamental distribution of a door describes the probability it opens in the best of conditions (with respect to other doors being open or closed). We show that if in two configurations of d doors corresponding doors share the same fundamental distribution, then these configurations have the same optimal running time up to a universal constant, no matter what the dependencies between doors and what the distributions. We also identify algorithms that are optimal up to a universal constant factor. For the case in which all doors share the same fundamental distribution, we additionally provide a simpler algorithm and a formula to calculate its running time. We furthermore analyse the price of lacking feedback for several configurations governed by standard fundamental distributions. In particular, we show that the price is logarithmic in d for memoryless doors but can potentially grow to be linear in d for other distributions.
We then turn our attention to investigate precise bounds. Even for the case of two doors, identifying the optimal sequence is an intriguing combinatorial question. Here, we study the case of two cascading memoryless doors. That is, the first door opens on each knock independently with probability p1. The second door can only open if the first door is open, in which case it will open on each knock independently with probability p2. We solve this problem almost completely by identifying algorithms that are optimal up to an additive term of 1.

References

[1]
Xiaohui Bei, Ning Chen, and Shengyu Zhang. 2013. On the complexity of trial and error. In Symposium on Theory of Computing Conference (STOC’13). 31--40.
[2]
David E. Bell. 1982. Regret in decision making under uncertainty. Operat. Res. 30, 5 (1982), 961--981.
[3]
Michael Ben-Or and Avinatan Hassidim. 2008. The Bayesian learner is optimal for noisy binary search (and pretty good for quantum as well). In Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, (FOCS’08). 221--230.
[4]
Lucas Boczkowski, Amos Korman, and Yoav Rodeh. 2016. Searching on trees with noisy memory. CoRR abs/1611.01403 (2016). http://arxiv.org/abs/1611.01403
[5]
Matthias Brand, Christian Laier, Mirko Pawlikowski, and Hans J. Markowitsch. 2009. Decision making with and without feedback: The role of intelligence, strategies, executive functions, and cognitive styles. J. Clin. Exp. Neuropsychol. 31, 8 (2009), 984--998. arXiv:http://dx.doi.org/10.1080/13803390902776860 19358007.
[6]
Ehsan Emamjomeh-Zadeh, David Kempe, and Vikrant Singhal. 2016. Deterministic and probabilistic binary search in graphs. In Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing (STOC’16). 519--532.
[7]
Uriel Feige, Prabhakar Raghavan, David Peleg, and Eli Upfal. 1994. Computing with noisy information. SIAM J. Comput. 23, 5 (Oct. 1994), 1001--1018.
[8]
L. A. Giraldeau and T. Caraco. 2000. Social Foraging Theory. Princeton University Press.
[9]
Richard M. Karp and Robert Kleinberg. 2007. Noisy binary search and its applications. In Proceedings of the 18th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA’07). Society for Industrial and Applied Mathematics, Philadelphia, PA, 881--890. http://dl.acm.org/citation.cfm?id=1283383.1283478
[10]
Michael N. Katehakis and Arthur F. Veinott, Jr. 1987. The multi-armed bandit problem: Decomposition and computation. Math. Oper. Res. 12, 2 (May 1987), 262--268.
[11]
Michael J. Kearns and Umesh V. Vazirani. 1994. An Introduction to Computational Learning Theory. MIT Press, Cambridge, MA.
[12]
Amos Korman and Yoav Rodeh. 2017. The dependent doors problem: An investigation into sequential decisions without feedback. In Proceedings of the 44th International Colloquium on Automata, Languages, and Programming (ICALP’17).
[13]
Amos Korman, Jean-Sébastien Sereni, and Laurent Viennot. 2013. Toward more localized local algorithms: Removing assumptions concerning global knowledge. Distrib. Comput. 26, 5--6 (2013), 289--308.
[14]
Michael Luby. 1986. A simple parallel algorithm for the maximal independent set problem. SIAM J. Comput. 15, 4 (1986), 1036--1053.
[15]
Thomas M. Mitchell. 1997. Machine Learning (1 ed.). McGraw--Hill, Inc., New York, NY.
[16]
Douglas C. Montgomery. 2006. Design and Analysis of Experiments. John Wiley 8 Sons.
[17]
Andrzej Pelc. 2002. Searching games with errors - fifty years of coping with liars. Theor. Comput. Sci. 270, 1--2 (2002), 71--109.
[18]
Richard S. Sutton and Andrew G. Barto. 1998. Introduction to Reinforcement Learning (1st ed.). MIT Press, Cambridge, MA.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Algorithms
ACM Transactions on Algorithms  Volume 14, Issue 4
October 2018
445 pages
ISSN:1549-6325
EISSN:1549-6333
DOI:10.1145/3266298
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 August 2018
Accepted: 01 May 2018
Received: 01 June 2017
Published in TALG Volume 14, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Combinatorics
  2. multi-armed bandit
  3. no feedback
  4. search

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • European Research Council (ERC)
  • European Union's Horizon 2020 research and innovation programme

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 104
    Total Downloads
  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media