A combinatorial multi-armed bandit approach to correlation clustering

被引:0
|
作者
F. Gullo
D. Mandaglio
A. Tagarelli
机构
[1] UniCredit,Department of Computer Engineering, Modeling, Electronics, and Systems Engineering (DIMES)
[2] University of Calabria,undefined
来源
关键词
Correlation clustering; Combinatorial multi-armed bandit; Regret analysis; Exploration and exploitation; Approximation oracle; Minimization of disagreements; Maximization of agreements; Combinatorial lower confidence bound; Probability constraint; Expected cumulative loss;
D O I
暂无
中图分类号
学科分类号
摘要
Given a graph whose edges are assigned positive-type and negative-type weights, the problem of correlation clustering aims at grouping the graph vertices so as to minimize (resp. maximize) the sum of negative-type (resp. positive-type) intra-cluster weights plus the sum of positive-type (resp. negative-type) inter-cluster weights. In correlation clustering, it is typically assumed that the weights are readily available. This is a rather strong hypothesis, which is unrealistic in several scenarios. To overcome this limitation, in this work we focus on the setting where edge weights of a correlation-clustering instance are unknown, and they have to be estimated in multiple rounds, while performing the clustering. The clustering solutions produced in the various rounds provide a feedback to properly adjust the weight estimates, and the goal is to maximize the cumulative quality of the clusterings. We tackle this problem by resorting to the reinforcement-learning paradigm, and, specifically, we design for the first time a Combinatorial Multi-Armed Bandit (CMAB) framework for correlation clustering. We provide a variety of contributions, namely (1) formulations of the minimization and maximization variants of correlation clustering in a CMAB setting; (2) adaptation of well-established CMAB algorithms to the correlation-clustering context; (3) regret analyses to theoretically bound the accuracy of these algorithms; (4) design of further (heuristic) algorithms to have the probability constraint satisfied at every round (key condition to soundly adopt efficient yet effective algorithms for correlation clustering as CMAB oracles); (5) extensive experimental comparison among a variety of both CMAB and non-CMAB approaches for correlation clustering.
引用
收藏
页码:1630 / 1691
页数:61
相关论文
共 50 条
  • [31] Crowdsensing Data Trading based on Combinatorial Multi-Armed Bandit and Stackelberg Game
    An, Baoyi
    Xiao, Mingjun
    Liu, An
    Xie, Xike
    Zhou, Xiaofang
    [J]. 2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 253 - 264
  • [32] The Multi-Armed Bandit With Stochastic Plays
    Lesage-Landry, Antoine
    Taylor, Joshua A.
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (07) : 2280 - 2286
  • [33] The budgeted multi-armed bandit problem
    Madani, O
    Lizotte, DJ
    Greiner, R
    [J]. LEARNING THEORY, PROCEEDINGS, 2004, 3120 : 643 - 645
  • [34] Dynamic Multi-Armed Bandit with Covariates
    Pavlidis, Nicos G.
    Tasoulis, Dimitris K.
    Adams, Niall M.
    Hand, David J.
    [J]. ECAI 2008, PROCEEDINGS, 2008, 178 : 777 - +
  • [35] Scaling Multi-Armed Bandit Algorithms
    Fouche, Edouard
    Komiyama, Junpei
    Boehm, Klemens
    [J]. KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2019, : 1449 - 1459
  • [36] Multi-armed Bandit with Additional Observations
    Yun, Donggyu
    Proutiere, Alexandre
    Ahn, Sumyeong
    Shin, Jinwoo
    Yi, Yung
    [J]. PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 2018, 2 (01)
  • [37] IMPROVING STRATEGIES FOR THE MULTI-ARMED BANDIT
    POHLENZ, S
    [J]. MARKOV PROCESS AND CONTROL THEORY, 1989, 54 : 158 - 163
  • [38] Satisficing in Multi-Armed Bandit Problems
    Reverdy, Paul
    Srivastava, Vaibhav
    Leonard, Naomi Ehrich
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (08) : 3788 - 3803
  • [39] MULTI-ARMED BANDIT ALLOCATION INDEXES
    JONES, PW
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 1989, 40 (12) : 1158 - 1159
  • [40] Multi-user lax communications: a multi-armed bandit approach
    Avner, Orly
    Mannor, Shie
    [J]. IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,