### Abstract

In the multiarmed bandit problem, a gambler must decide which arm of K non-identical slot machines to play in a sequence of trials so as to maximize his reward. This classical problem has received much attention because of the simple model it provides of the trade-off between exploration (trying out each arm to find the best one) and exploitation (playing the arm believed to give the best payoff). Past solutions for the bandit problem have almost always relied on assumptions about the statistics of the slot machines. In this work, we make no statistical assumptions whatsoever about the nature of the process generating the payoffs of the slot machines. We give a solution to the bandit problem in which an adversary, rather than a well-behaved stochastic process, has complete control over the payoffs. In a sequence of T plays, we prove that the per-round payoff of our algorithm approaches that of the best arm at the rate O(T^{-1/2}). We show by a matching lower bound that this is the best possible. We also prove that our algorithm approaches the per-round payoff of any set of strategies at a similar rate: if the best strategy is chosen from a pool of N strategies, then our algorithm approaches the per-round payoff of the strategy at the rate O((log N)^{1/2}T^{-1/2}). Finally, we apply our results to the problem of playing an unknown repeated matrix game. We show that our algorithm approaches the minimax payoff of the unknown game at the rate O(T^{-1/2}).

Original language | English (US) |
---|---|

Pages (from-to) | 48-77 |

Number of pages | 30 |

Journal | SIAM Journal on Computing |

Volume | 32 |

Issue number | 1 |

DOIs | |

State | Published - Jan 1 2003 |

Externally published | Yes |

### All Science Journal Classification (ASJC) codes

- Computer Science(all)
- Mathematics(all)

### Keywords

- Adversarial bandit problem
- Unknown matrix games

## Fingerprint Dive into the research topics of 'The nonstochastic multiarmed bandit problem'. Together they form a unique fingerprint.

## Cite this

*SIAM Journal on Computing*,

*32*(1), 48-77. https://doi.org/10.1137/S0097539701398375