Skip to main content

Implementation of Exploration in TONIC Using Non-stationary Volatile Multi-arm Bandits

  • Conference paper
  • First Online:
Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1048))

  • 1228 Accesses

Abstract

Target Oriented Network Intelligence Collection (TONIC) is a problem which deals with acquiring maximum number of profiles in the online social network so as to maximize the information about a given target through these profiles. The acquired profiles, also known as leads in this paper, are expected to contain information which is relevant to the target profile.In the past, TONIC problem has been solved by modelling it as a Volatile Multi-arm bandit problem with stationary reward distribution. The problem with this approach is that the underlying reward distribution in case of TONIC changes with each exploration which needs to be incorporated for making future acquisitions. The paper shows a successful solution to the TONIC problem by modelling it as Volatile Bandit problem with non-stationary reward distributions. It illustrates a new approach and compares it’s performance with other algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Stern, R., Samama, L., Puzis, R., Beja, T., Bnaya, Z.: TONIC: Target oriented network intelligence collection for the social web. In: 27th AAAI Conference on Artificial Intelligence, pp. 1184–1190 (2013)

    Google Scholar 

  2. Samama-Kachko, L.: Target Oriented network intelligence collection (TONIC) (2014)

    Google Scholar 

  3. Samama-kachko, L., Stern, R., Felner, A.: Extended Framework for Target Oriented Network Intelligence Collection. In: (SoCS), pp. 131–138 (2014)

    Google Scholar 

  4. Bnaya, Z., Puzis, R., Stern, R., Felner, A.: Bandit algorithms for social network queries. In: Proceedings-SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, 148153 (2013)

    Google Scholar 

  5. Chakrabarti, D., Kumar, R., Radlinski, F., Upfal, E.: Mortal multi-armed bandits. In: Neural Information Processing Systems, pp. 273–280 (2008)

    Google Scholar 

  6. Bnaya, Z., Puzis, R., Stern, R., Felner, A.: Volatile multi-armed bandits for guaranteed targeted social crawling. In: Late Breaking Papers at the Twenty-Seventh AAAI Conference on Artificial Intelligence, pp. 8–10 (2013)

    Google Scholar 

  7. Auer, P.: Using confidence bounds for Exploration Exploitation trade-offs. JMLR 3, 397–422 (2002)

    Google Scholar 

  8. Auer, P., Cesa-Bianchi, N., Fischer, P.: Mach. Learn. 47, 235 (2002). https://doi.org/10.1023/A:1013689704352

    Article  Google Scholar 

  9. Garivier, A., Moulines, E.: On upper-confidence bound policies for non-stationary bandit problems (2008). arXiv:0805.3415

  10. Kocsis, L., Szepesvri, C.: Discounted UCB. In: 2nd PASCAL Challenges Workshop, pp. 784–791 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. K. Tripathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shaha, A., Arya, D., Tripathy, B.K. (2020). Implementation of Exploration in TONIC Using Non-stationary Volatile Multi-arm Bandits. In: Das, K., Bansal, J., Deep, K., Nagar, A., Pathipooranam, P., Naidu, R. (eds) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 1048. Springer, Singapore. https://doi.org/10.1007/978-981-15-0035-0_18

Download citation

Publish with us

Policies and ethics