<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Amortized Active Learning for Nonparametric Functions</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Cen-You Li</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marc Toussaint</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Barbara Rakitsch</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christoph Zimmer</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bosch Center for Artificial Intelligence</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Technical University of Berlin</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>18</fpage>
      <lpage>32</lpage>
      <abstract>
        <p>Active learning (AL) is a sequential learning scheme aiming to select the most informative data. AL reduces data consumption and avoids the cost of labeling large amounts of data. However, AL trains the model and solves an acquisition optimization for each selection. It becomes expensive when the model training or acquisition optimization is challenging. In this paper, we focus on active nonparametric function learning, where the gold standard Gaussian process (GP) approaches sufer from cubic time complexity. We propose an amortized AL method, where new data are suggested by a neural network which is trained up-front without any real data (Figure 1). Our method avoids repeated model training and requires no acquisition optimization during the AL deployment. We (i) utilize GPs as function priors to construct an AL simulator, (ii) train an AL policy that can zero-shot generalize from simulation to real learning problems of nonparametric functions and (iii) achieve real-time data selection and comparable learning performances to time-consuming baseline methods.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Active learning (AL) is a sequential learning scheme aiming to reduce the efort and cost of labeling
data [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1–3</xref>
        ]. The goal is to maximize the information given by each data point, so the quantity can be
reduced. An Active Learning (AL) method starts with a small amount of labeled data. The model is
ifrst trained on the labeled data, and then the trained model is used to evaluate acquisition scores for
the unlabeled data. The acquisition function measures the expected knowledge gained from labeling
a data point. Labels are then requested for the data points with the peaked acquisition scores, and
the labeled dataset is updated for the next AL iteration. AL can be run for several iterations until
the budget is exhausted or until a training goal is achieved. To perform AL, however, one would
face multiple challenges: (i) training models for every query can be nontrivial, especially when the
learning time is constrained [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4–6</xref>
        ]; (ii) acquisition criteria need to be selected a priori but none of them
clearly outperforms the others in all cases, which makes the selection dificult [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]; (iii) optimizing an
acquisition function can be dificult (e.g. sophisticated discrete search space [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]).
      </p>
      <p>
        In this paper, we propose an AL method that suggests new data points for labeling based on a neural
network (NN) evaluation instead of the costly model training and acquisition function optimization
(Figure 1). To this end, we decouple model training and acquisition function optimization from the AL loop.
This is beneficial when we face the aforementioned challenges (i) and (iii), i.e. scenarios where either
the querying time (training time pluses optimization time) is precious [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4–6</xref>
        ] or it is dificult to optimize
an acquisition function [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. In these settings, making a high-quality data selection is too expensive, such
that one would rather accept a faster and easier active learner even with a potential tradeof of slightly
worse acquisition quality. Notably, as AL tackles data scarcity problem, such a NN policy function
should be obtained with no additional real data.
      </p>
      <p>
        We further focus our problem on actively learning regression tasks. The idea is to (i) generate a rich
distribution of functions, (ii) simulate AL experiments on those functions, (iii) train the NN policy in
simulation, and then (iv) zero-shot generalize to real AL problems. For low data learning problems (up
to thousands of data points), Gaussian processes (GPs, [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]) are a powerful model family that naturally
ifts our approach. A GP is a distribution of nonparametric functions that, if used as the model in
an AL loop (Figure 1, left), provides well-calibrated predictive distributions suitable for acquisition
functions [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14">11–14</xref>
        ]. This paper utilizes GPs to sample functions and simulate AL of regression problems
(Figure 1, right). In other words, we perform amortized inference [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] of an active learner from GP
simulations.
      </p>
      <p>Please notice the diference between the model and the NN policy. In this paper, model always refers
to the model one wish to actively learn on a specific task, while the NN policy proposes AL queries and
the queries are then used to fit the model.</p>
      <sec id="sec-1-1">
        <title>Contributions:</title>
        <p>We summarize our contributions:
• we formulate a training pipeline of active nonparametric function learning policy which requires
no real data;
• we propose diferentiable AL objectives in closed form for the training;
• we demonstrate empirical analysis on common benchmark problems.</p>
        <p>
          Related works: AL [
          <xref ref-type="bibr" rid="ref1 ref2 ref3">1–3</xref>
          ] is prominent in
various applications such as image classifica- Algorithm 1: Classical AL
tion [
          <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
          ] or physical system modeling [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. In
regression tasks, GPs demonstrate great advan- Require: 0 ⊆  ×  , acquisition function 
tage in AL acquisitions [
          <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20 ref21">16–21</xref>
          ]. An acquisition 1: for  = 1, ...,  do
function plays a major role in AL methods (Al- 2: Model ℳ− 1 with − 1
gorithm 1). Entropy, which selects the most 3:  = ∈ (|ℳ− 1, − 1)
uncertain points in the space, is a popular ac- 4: Evaluate  at 
quisition function due to its efectiveness and 5:  ←  − 1 ∪ {, }
computational simplicity [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. Mutual infor- 6: end for
mation is another well-known option. A mutual information criterion can focus on the information
gain in the space [
          <xref ref-type="bibr" rid="ref11 ref13">11, 13</xref>
          ] or take model improvement [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] into account, which is often considered
superior to entropy. However, depending on the settings, mutual information is often intractable and
creates computational overhead. A closely related field is Bayesian optimization (BO, [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]) which aims
to find the global optima of functions with limited evaluations. The same algorithm (Algorithm 1) can
be applied to BO problem by exchanging the acquisition function. BO as well sufers from repeated
model training and acquisition optimization.
        </p>
        <p>
          Recently, meta learning and amortized inference have been explored to tackle challenges of sequential
learning methods. Konyushkova et al. proposed to meta learn an acquisition function for AL, avoiding a
priori selection [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. Given an acquisition function, Swersky et al. proposed to do an amortized inference
on acquisition optimization [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. On GP learning problems, Rothfuss et al. proposed to meta learn
GP hyperparameters [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] while Bitzer et al. performed amortized inference to select GP kernels and
hyperparameters [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ], both of which simplify the model fitting which is a bottleneck in real time
applications [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          To the best of our knowledge, very rare works automate the entire data selection process, i.e. decouple
model updates, automate acquisition evaluations and optimizations. In [
          <xref ref-type="bibr" rid="ref26 ref27">26, 27</xref>
          ], the authors proposed
RNN optimizers which query points by simple forwarding. Foster et al. proposed the deep adaptive
design (DAD), an amortized Bayesian experimental design, which as well resorts sequential data
selection to simple NN forwarding [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ]. While DAD provides an AL deployment procedure as we aim
for, they collect data to learn parametric models. The data selection criterion does not necessarily fit
into nonparametric functions. Ivanova et al. further extended DAD to learn intractable models, which
is however a diferent direction from our goal [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ].
        </p>
        <p>
          None of the literature we found considers amortized inference of active nonparametric function
learning. Interestingly, Krause et al. discussed theoretical perspectives of an a priori acquisition policy
for active GP learning [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. This provides key insight into our AL simulation. We take inspiration
from [
          <xref ref-type="bibr" rid="ref12 ref27 ref28">12, 27, 28</xref>
          ] to develop our amortized AL method.
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Problem Statement</title>
      <p>We are interested in a regression task of an
unknown function  :  → R, where  ⊆ R Algorithm 2: AL with NN Policy
is the input space. We assume  is a bounded
space, which usually holds true in reality, as Require: 0 ⊆  ×  , AL policy 
one normally focuses only on a domain of in- 1: for  = 1, ...,  do
terest. The observations we access are always 2:  = (− 1)
noisy. That is, a labeled data point comprises 3: Evaluate  at 
an input  ∈  and its corresponding output 4:  ←  − 1 ∪ {, }
observation () =  () +  , where  () is 5: end for
a functional value and  is an unknown noise 6: Model  with 
value. For brevity, we write  := () and  := (). For clarity later, we let  ⊆ R
denote the output space, i.e.  ∈ ,  ⊆  × denote a dataset, and ( × ) := {| ⊆  ×}
denote the space of datasets.
 is given, and we have</p>
      <p>We follow an AL setting: a small labeled dataset 0 := {,, ,}=1
budget to label  more data points, denoted by (1, 1), ..., ( ,  ). The high level goal is to conduct
AL to select informative 1, ...,  such that  = 0 ∪ {1, 1, ...,  ,  } helps us construct a
good model of  . In a conventional AL method (Figure 1, left and Algorithm 1), the data are selected
iteratively by optimizing the acquisition criteria. In this paper, we aim to have a policy function
 : ( ×  ) →  up front, which sees current observations and directly provide the next query
proposal (Figure 1, right and Algorithm 2). We assume no additional real data are available for the
policy training. Nevertheless, we make assumptions that  has a GP prior and that our observation data
are normalized to zero mean and unit variance. In the following, we will sometimes write  :=
(,1, ..., , ),  := (,1, ..., , ),  := (,1, ..., , , 1, ..., ),  :=
(,1, ..., , , 1, ..., ), for  = 1, ...,  .</p>
      <p>
        Assumptions: We assume  has a GP prior. A GP is a distribution over functions, characterized by
the mean (E[ ()]) and kernel (covariance  () and  (′), for two input points , ′). Without loss of
generality, one usually assumes the mean is a zero function, which holds true when the observation
values are normalized. The kernel function is typically parameterized, and it encodes the amplitude
and smoothness of the function  . We refer the readers to [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] for details. The assumption is formally
described below.
      </p>
      <p>
        Assumption 2.1. The unknown function  has a GP prior (0,  ). Any observation at  is
 =  () +  ,  ∼  (0,  2) is an i.i.d. Gaussian noise [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Here,  :  ×  → R is a kernel
function parameterized by  . We further assume  (, ′) ≤ 1.
      </p>
      <p>Bounding the kernel scale by one is not restrictive, as we assume the observations are normalized
to unit variance. Due to a GP prior, any finite number of functional values are jointly Gaussian. GP
distributions are provided in closed form in Appendix A.</p>
      <p>We want to emphasize that the GP assumption is mainly for policy training. On a test function,
failing this assumption (we however would not know a priori) may result in bad data selection, but our
AL method can still be deployed as the data selection is decoupled from GP modeling.</p>
    </sec>
    <sec id="sec-3">
      <title>3. AL with a priori trained policy</title>
      <sec id="sec-3-1">
        <title>Our goal here is to train a policy  to run Al</title>
        <p>
          gorithm 2. Here we take key inspiration
from [
          <xref ref-type="bibr" rid="ref28 ref29">28, 29</xref>
          ]. The idea is to exploit the GP
prior (Assumption 2.1) before AL experiments.
We use the GP prior ( ) and the Gaussian
likelihood (|,  ) =  ︀( | (),  2)︀ to
construct a simulator. This allows us to
sample functions, simulate policy-based AL
(Algorithm 2) and then meta optimize an
objective function which encodes the acquisition
criterion (Algorithm 3). The key is to ensure
that the policy experiences AL on diverse
functions, then during a real AL experiment, the
policy makes a zero-shot amortized inference
from the simulation. Note that the training is
performed by simulating active GP learning,
while, in a real AL experiment, the policy only
collects data, and we are not forced to make
GP modeling with the collected data.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Algorithm 3: Nonmyopic AL training</title>
        <p>
          Require: prior (0,  ), ( ) =  (0,  2), 
1: sample a batch of ,  2
2: sample a batch of  ∼  (0,  )
3: sample 0 ⊆  ×  , given  and ( )
4: for  = 1, ...,  do
5:  = (− 1)
6: sample   ∼ ( ),  =  () +  
7:  ←  − 1 ∪ {, }
8: end for
9: if entropy loss then
10: compute loss per Eq. (4)
11: else if regularized entropy loss then
12: sample  ⊆ 
13: sample  =  () + 
14: compute loss per Eq. (5)
15: end if
16: update 
Training objectives: We first discuss the
training objectives, as they provide insight into
what exact data we generate. Similar to [
          <xref ref-type="bibr" rid="ref27 ref28">27, 28</xref>
          ], the idea is to turn the acquisition criteria we would
have optimized in a conventional AL setting into loss objectives where the learner gradient is
available (Figure 1).
        </p>
        <p>
          Imagine we are doing AL with Algorithm 2 on synthetic functions. The first remark is that in a
simulation, functions are always sampled from a known GP prior, i.e. parameters ,  2 are known before
we start the simulated AL procedure. Thus, given a sequence of queries provided by a learner, the joint
GP distribution is available in closed form. Therefore, an intuitive approach is to apply common entropy
or (approximated) mutual information criteria on the policy selected points. We take the definition
from [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], where the authors discuss policy-based AL which naturally applies to NN policies as well:
ℋ() := E((· ), =1,..., ) [− log (,1, ..., , )] ,
ℐ() := E((· ), =1,..., ) [− log (,1, ..., , ) + log (,1, ..., , |( ∖ ))] ,
(1)
(2)
where  (· ) and  =1,..., are GP and noise realizations, ,1, ..., , correspond to policy selected
queries ,1, ..., , , and ( ∖ ) means the realization over space  ∖ {,1, ..., , }. In [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], the
the function sampling while the AL policy is dealing with each function deterministically.
input space  is a discrete space of finite number of elements, which makes ( ∖ ) a computable
set of values. We will describe ( ∖ ) in more details later. Note here that stochasticity arises from
        </p>
        <p>
          Maximizing the entropy objective (Eq. (1)) would favor a set of uncorrelated points and naturally
encourage points at the border which are the most scattered [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. In our initial experiments, we noticed
that this entropy objective needed more careful tuning, as it often overemphasized the boundary and
ignored to explore in the space. The mutual information criterion is known to tackle this problem, at
︀(
least in conventional AL settings [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], but, on the other hand, the aforementioned objective ℐ() in its
original form makes conditioning on ( ∖ ). This is not well-defined when
 is a continuous space.
cubic complexity  | |
Even if  is discrete, conditioning on large pool (fine discretization) is computationally heavy, i.e. GP
3)︀ (Appendix A). Discrete pool also enforces a classifier-like policy  (select
points from a pool) which prohibits us from utilizing the existing NN structure developed by [
          <xref ref-type="bibr" rid="ref28 ref29">28, 29</xref>
          ].
        </p>
        <p>We thus wish to modify ℐ(). Note that ℐ() is a regularized entropy objective, and ℋ(), although
not always well performing, can already be used for training. Therefore, we propose a simple yet efective
approach: compute the regularization term only on a sparse set of  samples (, ) ∈
ℐ() ≈ E((· ), =1,..., ) [− log (,1, ..., , ) + log (,1, ..., , |)] .
 should be much larger than  . Maximizing this objective encourages {,1, ..., , } to track
subsets of . To keep the policy from selecting only those sparse grid samples, which are not
necessarily optimal points, we re-sample  in each training step. The intuition of this objective is
two-fold: (i) it can be viewed as an entropy objective regularized by an additional search space indicator,
or (ii) it can be viewed as an imitation objective because a subset of grid points, if happens to have large
joint entropy, maximizes the objective.</p>
        <p>The above losses consider a fixed set of GP hyperparameters, which encodes only certain function
features. To generalize to diverse functions, we take the GP hyperparameters into account, and note
that a real AL is initiated with initial data points. Our policy objectives become
ℋ() = E(, 2)E((· ), =1,..., ) [− log (,1, ..., , , )]</p>
        <p>∝ E(, 2)E((· ), =1,..., ) [− log (,1, ..., , |)]
ℐ() ≈ E(, 2)E((· ), =1,..., ) [− log (,1, ..., , , ) + log (,1, ..., , , |)]
∝ E(, 2)E((· ), =1,..., ) [− log (,1, ..., , |) + log (,1, ..., , |, )] .
The proportion symbol here indicates equivalency, and this holds by applying Bayes rule and removing
the part that is not relevant to the policy gradient. In this paper, we sample , ,  2 uniformly.
Please see the appendix for numerical details.</p>
        <p>To summarize, we are given priors ( ) ∼  (0,  ), ( ) ∼ 
hyperparameters  and  2, we may then sample GP function and noise realizations and a policy
returns sequences of data by actively learning those functions. Then the data are plugged into meta AL
objectives (Eqs. (4) and (5)) where the gradient propagates from the queries backward into the policy.
We see here that data are generated where Eqs. (4) and (5) require, and this allows one to easily sample
thousands or millions of functions in the training. In the next section, we zoom into the sampling of
(0,  2) with uniformly random
the policy-queried data.</p>
        <sec id="sec-3-2-1">
          <title>Simulated AL:</title>
          <p>The objective functions provide insight into the simulation procedure: sample a
GP function realization, sample initial data, perform AL cycles by forwarding with the policy, and
maximize either the policy entropy (Eq. (4)) or the regularized policy entropy (i.e. the modified mutual
information Eq. (5)). The training procedure is summarized in Algorithm 3. One can see that lines 4-8
are simulating AL cycles as how the policy will be deployed (Algorithm 2).
(3)
(4)
(5)</p>
          <p>The only remaining challenge here is to ensure that ,1, ..., , are from the same GP function. This
is not trivial because the observations are sampled iteratively, i.e. ∀ = 1, ...,  ,  = (− 1), which
means ,1, ..., ,− 1 need to be sampled before , ...,  are known. One way is to make a standard
GP posterior sampling  ∼ (()|− 1,  ,  2) instead of line 2 and 6 of Algorithm 3. However, this
results in  ︀( 3 + ( + 1)3 + ... + ( +  − 1)3)︀ complexity in time, i.e. the notorious GP
cubic complexity (Appendix A). Sampling  (line 11 of Algorithm 3) would also take tremendous
time.</p>
          <p>
            We address this issue by applying a decoupled function sampling technique [
            <xref ref-type="bibr" rid="ref30 ref31">30, 31</xref>
            ]. The idea is to
sample Fourier features to approximate a GP function. As a result, an approximated function is a linear
combination of cosine functions (line 2 of Algorithm 3), and we can later compute the function value at
any point  ∈  in linear time (line 6 &amp; 13 of Algorithm 3). One limitation arises, however, is that the
kernel  needs to have a Fourier transform (e.g. stationary kernels, see Bochner’s theorem in [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ]).
          </p>
          <p>Notice that this training procedure simulates a nonmyopic AL. That is, the  queries are optimized if
considered jointly but not necessarily stepwise optimal. We additionally provide a myopic AL training
algorithm detailed in appendix (Algorithm 4), which optimizes stepwise data selection. This idea is
simple: the initial dataset has size randomly sampled from {, ...,  +  − 1}, the policy query
one point, and then we compute the same loss objectives with the altered sequential structure. A myopic
policy is not expected to have better AL performance but can avoid making recursive NN inference
during the training. This might be beneficial if we want to scale the training up to larger  or larger
 .</p>
          <p>
            NN structure: We take the NN described in [
            <xref ref-type="bibr" rid="ref29">29</xref>
            ]. Each data pair (, ) is first mapped by a MLP
(multilayer perceptrons) to a 32 dimension embedding, then two layers of transformer encoders ([
            <xref ref-type="bibr" rid="ref32">32</xref>
            ],
without positional encoding) are applied to the sequence of data pair embeddings, and finally the
attended sequence is summed (ensure permutation invariance of observed dataset) before mapped by
another MLP to a new data query. The details are described in [
            <xref ref-type="bibr" rid="ref28 ref29">28, 29</xref>
            ]. We only add another Tanh
layer with rescaling constants to refine the decoder output (refine the output to  which is bounded in
our case). The query is in continuous  space and this is how we train the policy. If an AL problem is
considered over discrete  , one simple approach is to select the point closest to the NN query (line 2
of Algorithm 2).
          </p>
          <p>Complexity: The training complexities are in Appendix C. The AL deployment complexities are as
follows
• amortized AL (Algorithm 2): NN forwarding takes  ︀( ( +  − 1)2)︀ at each ;
• conventional GP AL (Algorithm 1): at each , GP modeling takes  ︀( ( +  − 1)3)︀ in time
while complexity of acquisition optimization depends on the exact AL problems.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Experiments</title>
      <sec id="sec-4-1">
        <title>In this section, we test our methods on a couple of benchmark tasks.</title>
        <p>
          4.1. NN training
We prepare the experiments by running Algorithm 3, which corresponds to the up-front preparation
block in Figure 1. The entire Algorithm 3 is one NN training step. We implement the training pipeline
with PyTorch. In the following experiments, we train one NN policy for 1D benchmark tasks and
one NN for 2D tasks. The training time and the hardware are described in Table 1. The state dict
(PyTorch model parameters) takes around 200 KB disk space for both NNs. The training of each setting
is repeated five times with diferent random seeds. Among the five training jobs of each NN, we select
the NN with the best training loss for the following experiments. See Appendix E for details.
4.2. Benchmark tasks
We deploy AL over the following benchmark problems. Our NNs are trained with  = [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ].
Sin function (1D): This is a one dimension problem  ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ],  () = sin(20). In the experiments,
we sample Gaussian noise  ∼  ︀( 0, 0.12)︀ .
        </p>
        <p>
          Branin function (2D): This function is defined over (1, 2) =∈ [
          <xref ref-type="bibr" rid="ref10">− 5, 10</xref>
          ] × [
          <xref ref-type="bibr" rid="ref15">0, 15</xref>
          ], which requires
a rescaling mapping ∀ ∈  , (1, 2) = (− 5 + 15[]1, 15[]2). The function
        </p>
        <p>
          ,,,,, ((1, 2)) = (2 − 12 + 1 − ) + (1 − )(1) + ,
the experiments, the noise is  ∼ 
where , , , , ,  = (1, 45 .12 , 5 , 6, 10, 81 ) are constants. We sample noise free data points and use the
samples to normalize our output ,,,,, ((1, 2)) = ,,,,,((1,2))− (,,,,,) . In
(,,,,,)
Unconstrained Simionescu function (2D): This is originally a constrained problem [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] defined
over (1, 2) ∈ [− 1.25, 1.25]2 (which again requires a rescaling mapping  → [− 1.25, 1.25]2). We
remove the constraint, resulting in  (1, 2) = 0.112. As Branin function, we sample noise free data
points and use the samples to normalize our output. In the experiments, the noise is  ∼  ︀( 0, 0.12)︀ .
Unconstrained Townsend function (2D): This is originally a constrained problem [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ] 1 defined
over (1, 2) ∈ [− 2.25, 2.25] × [− 2.5, 1.75] (rescaling mapping from  required). We remove the
constraint, resulting in  (1, 2) = − [cos((1 − 0.1)2)]2 − 1 sin(31 + 2). As Branin function,
we sample noise free data points and use the samples to normalize our output. In the experiments, the
noise is  ∼  ︀( 0, 0.12)︀ .
        </p>
        <p>
          Airline passenger dataset (1D): This is a publically available time series dataset 2. Each data point
has a date input (year and month) and a number of passengers as output. We convert the input into real
number as  + (ℎ − 1)/12, and then rescale the entire input space to [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] (the earliest date
becomes 0 while the latest becomes 1). The output data are again normalized to zero mean and unit
variance.
        </p>
        <p>
          Langley Glide-Back Booster (LGBB) dataset (2D): This is a two dimension dataset described
in [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ]3. The dataset has multiple outputs and we take the "lift" to run our experiments (after normalized
to zero mean and unit variance). The inputs are 1 (mach) and 2 (alpha). which are normalized by
1 = ℎ/6,
2 = (ℎ + 5)/35.
        </p>
        <p>
          After doing this, the input space is [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ]2.
4.3. AL deployment
We compare our methods with (i) standard GP AL (Algorithm 1) with entropy acquisition (Appendix D)
(ii) random selection criterion and (iii) DAD, i.e. amortized Bayesian experimental design proposed
by [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ]. In this section, we report the modeling performance and AL deployment time. Since the
highlevel goal is to model a regression task, we use the collected datasets to train models and evaluate the
RMSE as the modeling performance. Although DAD and our amortized AL methods are not restricted
to GP modeling, we still evaluate the data on GP models, as GPs are powerful modeling tools for such
amount of data and as this is a fair comparison to baseline (i).
        </p>
        <p>We run experiments over the aforementioned benchmark problems. Our NN policy returns points on
continuous space  ⊆ R. On benchmark functions, a query is taken as it is (line 2 of Algorithm 2),
while on the testing datasets (airline passenger and LGBB), we take the nearest point with 2-norm
from the pool. Notice that the single pre-trained 1D NN policy is used for all the 1D tasks and the 2D
NN policy for all the 2D tasks.</p>
        <p>For each method, we repeat the AL experiments (Algorithms 1 and 2) for five times and report the
mean and standard error. Each experiment is executed with individual seed. Note here that initial
datasets (and noises of function problems) are randomly sampled, where the seed plays a role.</p>
        <p>The results are shown in Figure 2. The RMSEs are evaluated after the AL deployments. For example,
with 1 dim problems (sin &amp; airline passenger dataset), we start with 1 initial points and query for 10
iterations, resulting in 11 data points in the end. Then the RMSEs are evaluated with GPs trained with
these 11 data points. The query time is the data selection time of all iterations. We can see that, on
all the presented benchmark problems except for the Sin function, data selected by our nonmyopic
amortized AL approaches achieve as good modeling performances as conventional GP AL, while the
querying time is significantly faster. Some of the RMSE out-performance of our nonmyopic approaches
(and the GP AL baseline) over Random is statistically significant (Wilcoxon signed-rank test, p-value
smaller than 0.05). With myopic training scheme, the policy can perform well in some tasks such as the
LGBB but badly in others. In our Appendix E, we present few more trained policies good at diferent
tasks. The DAD baseline sometimes performs well on 1 problems but not on any 2 problems.</p>
        <p>In general, we consider this result as a huge success. The tens-of-milliseconds-level decision-making
time per query allows amortized AL method to be applied to systems where output responses are given
in a few dozen Hz. In such systems, it is obviously expensive to wait for GP modeling and entropy
optimization.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>This work was supported by Bosch Center for Artificial Intelligence, which provided financial support,
computers and GPU clusters. The Bosch Group is carbon neutral. Administration, manufacturing and
research activities no longer leave a carbon footprint. This also includes GPU clusters on which the
experiments have been performed.</p>
      <p>Appendix.</p>
    </sec>
    <sec id="sec-6">
      <title>A. Gaussian process and entropy</title>
      <p>We first write down the GP predictive distribution. Given a set of  data points  =
{,  } ⊆  ×</p>
      <p>, we wish to make inference at points  = {,1, ..., ,}. We write
 = ((,1), ..., (,)) for brevity. The joint distribution of  and predictive  is
Gaussian:
(, ) =  ︀( 0,  ( ∪ ,  ∪ ) +  2+
︀)</p>
      <p>This leads to the following predictive distribution (or GP posterior distribution)
 ([ ∪ ], [ ∪ ] ).
where  ( ∪ ,  ∪ ) is a gram matrix with [ ( ∪ ,  ∪ )], =
(|) =  (| (), ()) ,
 () =  (, ) [︀  (, ) +  2
() =  (, ) +  2
︀] − 1 ,
−  (, ) [︀  (, ) +  2
 (, ) .</p>
      <p>Elements of the predictive mean vector  () are the noise-free predictive function values.</p>
      <p>Note that the log probability density function is
log (|) = − 1/2 log ((2 ) det(()))</p>
      <p>− 1/2( −  ()) [()]− 1 ( −  ()),
and, if we consider  as a vector of  random variables, the entropy is</p>
      <p>(|) =/2 log(2 ) + 1/2 log det(()).
time. Computing the determinant also has cubic time complexity.</p>
      <p>Inverting a  ×</p>
      <p>matrix [︀  (, ) +  2 ︀] has complexity (3) in</p>
    </sec>
    <sec id="sec-7">
      <title>B. Additional losses and myopic training algorithm</title>
      <sec id="sec-7-1">
        <title>In our main paper, we introduce</title>
        <p>ℋ() ∝E(, 2)E((· ), =1,..., ) [− log (,1, ..., , |)] ,
ℐ() ∝E(, 2)E((· ), =1,..., ) [− log (,1, ..., , |) + log (,1, ..., , |, )] .</p>
        <p>We additionally look into two more similar loss objectives. We treat policy selected points as random
variables, compute the entropy directly, and then take expectation over diferent priors and functions:
ℋ2() = E(, 2)E((· ), =1,..., ) [(,1, ..., , |)]
ℐ2() ≈ E(, 2)E((· ), =1,..., ) [(,1, ..., , |) − (,1, ..., , |, )] . (11)
Substituting Eqs. (8) and (9) into the losses, we see that the key diference is whether the observation
values ,1, ..., , are taken into account. We suspect that having ,1, ..., , in the loss (main losses)
may help the policy adapt in AL deployment.</p>
        <p>Our ablation study below compares the losses.
18–32
(6)
(7)
(8)
(9)
(10)
Myopic policy training: As described
in Section 3, we proposed another policy
training method which does not require recursive
NN forwarding. The idea is simple: as the
policy is intended to make AL with 
initial points for  iterations, we sample the size
of initial dataset from , ...,  +  − 1
during the training, and then we simulate
onestep AL. This allows the policy to experience
all sizes of datasets that it will be tackling
during an AL deployment. The training procedure
is shown in Algorithm 4. All the loss
functions are still the same: we condition on initial
dataset with altered sizes, consider one-step
query (compute as if  = 1), and propagate
the gradient.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>C. Training complexity</title>
      <sec id="sec-8-1">
        <title>Overall, the training complexities are listed below.</title>
      </sec>
      <sec id="sec-8-2">
        <title>Algorithm 4: Myopic AL training</title>
        <p>
          Require: prior (0,  ), ( ) =  (0,  2), 
1: sample ,  2
2: sample  ∼  (0,  )
3: sample  = 1, ..., 
4: sample − 1 ⊆  × 
5:  = (− 1)
6: sample   ∼ ( ),  =  () +  
7:  ←  − 1 ∪ {, }
8: if entropy loss then
9: compute loss per Eq. (4)
10: else if regularized entropy loss then
11: sample  ⊆ 
12: sample  =  () + 
13: compute loss per Eq. (5)
14: end if
15: update 
• computing loss:  ︀( 3 +  3)︀ in time and  ︀( 2 +  2)︀ in space for the entropy
objective (Eq. (4)), where the  terms are time and cost of computing the GP predictive distribution
(see Appendix A) while the  term of computing the log probability likelihood;
• computing loss:  ︀( ( + )3 +  3)︀ in time and  ︀( ( + )2 +  2)︀ in space for
our regularized entropy objective (Eq. (5));
• computing loss:  ︀( 3 +  3)︀ in time and  ︀( 2 +  2)︀ in space for the entropy version 2
objective (appendix Eq. (10));
• computing loss:  ︀( ( + )3 +  3)︀ in time and  ︀( ( + )2 +  2)︀ in space for
our regularized entropy version 2 objective (appendix Eq. (11));
• NN forwarding:  ︁( ∑︀=1( +  − 1)2)︁ =  ︀( ( +  − 1)3 − ( − 1)3)︀ with the
nonmyopic AL training (Algorithm 3), as self attention has square complexity [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ];
• NN forwarding:  ︀( ( +  − 1)2)︀ with our myopic AL training (Algorithm 4) (this algorithm
does not make recursive NN forwarding but the performance is worse).
        </p>
        <p>Note that we train only once to get a policy for various AL problems.</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>D. Numerical details</title>
      <p>
        Policy training: In our current implementation, the data dimension and input bound need to be
predefined. We fix  = [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ], and rescale all test problems to this region. The last layer of the NN
policy is () = (ℎ() + 1)/2 which ensures that the policy proposes points in [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ]. The
remaining structure is described in [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>In Algorithms 3 and 4, the kernel we use is a RBF kernel, which has  +1 variables: the variance  and
 dimension lengthscale vector , i.e.  = (, ). We sample  ∼   (0.505, 1.0),  2 = 1.01 − 
(function and noise variances sum to 1.01) and  ∼   (0.05, 1.0). The sampling hyperparameters
should be tuned according to the applications, our setting only use general assumptions. The variance
parameters utilize the assumptions that (i) data are normalized to unit variance and (ii) signal-to-noise
ratio is at least one. The lengthscale is kept general, but one has to make sure that it is numerically
stable (e.g. too small is bad because each lengthscale component is a divisor in the kernel).</p>
      <p>
        The GP functions are approximated by Fourier features, which means each function sample is a linear
combination of cos functions [
        <xref ref-type="bibr" rid="ref30 ref31">30, 31</xref>
        ]:
,  and  are sampled from distributions described in [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. Larger  leads to better approximations.
We set  = 100. The analytical mean of windows [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] is computed such that all functions can be
shifted to zero mean (a GP function has zero mean and unit variance over the entire real space, but
not necessarily in a specific bounded window). The analytical mean is the integral of  () divided by
volume of [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ]. The integral is
      </p>
      <p>1 ∑︁ √︀2/ sin ( + ) |1=0, for  = 1,
 =1</p>
      <p>− 1 ∑︁ √︀2/ cos ([]11 + []22 + ) |11=0|12=0, for  = 2,
[]1[]2 =1</p>
      <p>and so on.</p>
      <p>It may happen that at least one component of  is zero or is close to zero, which causes a problem
in the division. In this case, we replace |1/ ∏︀</p>
      <p>=1[]| by 100000. The error is negligible, i.e. much
smaller than noise level.</p>
      <p>
        The batch sizes are: for nonmyopic training (Algorithm 3), we sample 25 kernels (25 sets of  ), 10
sets of noise realizations  =1,..., , 25 functions per prior, resulting in overall 6250 AL experiments per
loss computation (expectation over 6250 sequences of  queries); for myopic training (Algorithm 4), we
sample 250 kernels, chunk them to 20 diferent batches, each has its own size of initial datasets, and the
remaining settings are the same. The grid samples of regularized entropy objective have  = 100.
Note that whenever we need to sample input points, e.g. , , we sample uniformly from
 = [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ].
      </p>
      <p>Experiments: In our experiments, we always model with a RBF kernel. Given a dataset, GP
hyperparameters are optimized with Type II maximum likelihood.</p>
      <p>In our GP AL baseline, the acquisition function is the predictive entropy (()|− 1) (see
Algorithm 1 and Eq. (9)). For the airline passenger and LGBB datasets, the acquisition score can be computed
on the entire pool of unseen data, and then the optimization can be solved by selecting the point with
the largest score. For function problems, at each , we randomly sample 5000 inputs points, optimize
on these points, make query and go to the next iterations.</p>
    </sec>
    <sec id="sec-10">
      <title>E. Ablation study</title>
      <p>
        Trained policy selection: For each training pipeline, we train with five diferent seeds. The optimizer
is RAdam [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ], and we try a few diferent initial learning rates (lrs). We set a lr scheduler to discount the
lr by 2% every 50 training steps. With DAD objective, ℋ and ℋ2, we train with 400 * 50 = 20000
steps, and with ℐ and ℐ2, we train with 200 * 50 = 10000 steps.
      </p>
      <p>The training results of 1 dimension policy (our implementation pre-define dimensions) is shown
in Figure 3 and 2 dimension in Figure 4. With our main nonmyopic training, the training loss appears
to be a good indicator of AL deployment performances. Policies with the minimized negative objectives
seem to perform the best in the test problems. With myopic training, it seems like each trained policy
may perform well in certain problems but badly in others. In our main paper, for each training objective,
we present the policy with best last-ten-epoch mean losses.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B.</given-names>
            <surname>Settles</surname>
          </string-name>
          ,
          <article-title>Active learning literature survey</article-title>
          , University of Wisconsin-Madison (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <article-title>Active learning query strategies for classification, regression, and clustering: A survey</article-title>
          ,
          <source>Journal of Computer Science and Technology</source>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tharwat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Schenck</surname>
          </string-name>
          ,
          <article-title>A survey on active learning: State-of-the-art, practical challenges and research directions</article-title>
          ,
          <source>Mathematics</source>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Islam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ghahramani</surname>
          </string-name>
          ,
          <article-title>Deep Bayesian active learning with image data</article-title>
          ,
          <source>International Conference on Machine Learning</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kirsch</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. van Amersfoort</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gal</surname>
          </string-name>
          ,
          <article-title>Batchbald: Eficient and diverse batch acquisition for deep bayesian active learning</article-title>
          ,
          <source>Advances in Neural Information Processing Systems</source>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Lederer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J. O.</given-names>
            <surname>Conejo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. A.</given-names>
            <surname>Maier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Umlauft</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hirche</surname>
          </string-name>
          ,
          <article-title>Gaussian process-based real-time learning for safety critical applications</article-title>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Baram</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>El-Yaniv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Luz</surname>
          </string-name>
          ,
          <article-title>Online choice of active learning algorithms</article-title>
          ,
          <source>Journal of Machine Learning Research</source>
          (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Konyushkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sznitman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Fua</surname>
          </string-name>
          ,
          <article-title>Learning active learning from data</article-title>
          ,
          <source>Advances in Neural Information Processing Systems</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>K.</given-names>
            <surname>Swersky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Rubanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Dohan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Murphy</surname>
          </string-name>
          ,
          <article-title>Amortized bayesian optimization over discrete spaces</article-title>
          ,
          <source>Conference on Uncertainty in Artificial Intelligence</source>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Rasmussen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <article-title>Gaussian processes for machine learning</article-title>
          , MIT Press (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C.</given-names>
            <surname>Guestrin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Krause</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Near-optimal sensor placements in gaussian processes</article-title>
          ,
          <source>International Conference on Machine Learning</source>
          (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Krause</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Guestrin</surname>
          </string-name>
          ,
          <article-title>Nonmyopic active learning of gaussian processes: An explorationexploitation approach</article-title>
          ,
          <source>International Conference on Machine Learning</source>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Krause</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Guestrin</surname>
          </string-name>
          ,
          <article-title>Near-optimal sensor placements in gaussian processes: Theory, eficient algorithms and empirical studies</article-title>
          ,
          <source>Journal of Machine Learning Research</source>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>N.</given-names>
            <surname>Houlsby</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Huszar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ghahramani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lengyel</surname>
          </string-name>
          ,
          <article-title>Bayesian active learning for classification and preference learning</article-title>
          ,
          <source>Computing Research Repository</source>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Gershman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. D.</given-names>
            <surname>Goodman</surname>
          </string-name>
          ,
          <article-title>Amortized inference in probabilistic reasoning</article-title>
          ,
          <source>Annual Meeting of the Cognitive Science Society</source>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>C.</given-names>
            <surname>Zimmer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Meister</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          Nguyen-Tuong,
          <article-title>Safe active learning for time-series modeling with gaussian processes</article-title>
          ,
          <source>Advances in Neural Information Processing Systems</source>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>R.</given-names>
            <surname>Garnett</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Osborne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hennig</surname>
          </string-name>
          ,
          <article-title>Active learning of linear embeddings for gaussian processes</article-title>
          ,
          <source>Conference on Uncertainty in Artificial Intelligence</source>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>J.</given-names>
            <surname>Schreiter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Nguyen-Tuong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Eberts</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Bischof</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Markert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Toussaint</surname>
          </string-name>
          ,
          <article-title>Safe exploration for active learning with gaussian processes, Machine Learning and Knowledge Discovery in Databases (</article-title>
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>X.</given-names>
            <surname>Yue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Hunt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <article-title>Active learning for gaussian process considering uncertainties with application to shape control of composite fuselage</article-title>
          ,
          <source>IEEE Transactions on Automation Science and Engineering</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>C.-Y. Li</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Rakitsch</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Zimmer</surname>
          </string-name>
          ,
          <article-title>Safe active learning for multi-output gaussian processes</article-title>
          ,
          <source>International Conference on Artificial Intelligence and Statistics</source>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bitzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Meister</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Zimmer</surname>
          </string-name>
          ,
          <article-title>Hierarchical-hyperplane kernels for actively learning gaussian process models of nonstationary systems</article-title>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Seo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wallat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Graepel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Obermayer</surname>
          </string-name>
          ,
          <article-title>Gaussian process regression: active data selection and test point rejection</article-title>
          ,
          <source>Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000</source>
          .
          <article-title>Neural Computing: New Challenges and Perspectives for the New Millennium 3 (</article-title>
          <year>2000</year>
          )
          <fpage>241</fpage>
          -
          <lpage>246</lpage>
          vol.
          <volume>3</volume>
          . URL: https://api.semanticscholar.org/CorpusID:18551791.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>E.</given-names>
            <surname>Brochu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. M.</given-names>
            <surname>Cora</surname>
          </string-name>
          , N. de Freitas,
          <article-title>A tutorial on bayesian optimization of expensive cost functions, with application to active user modeling and hierarchical reinforcement learning</article-title>
          ,
          <source>arXiv (</source>
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>J.</given-names>
            <surname>Rothfuss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Fortuin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Josifoski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Krause</surname>
          </string-name>
          , Pacoh:
          <article-title>Bayes-optimal meta-learning with pacguarantees</article-title>
          ,
          <source>International Conference on Machine Learning</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bitzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Meister</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Zimmer</surname>
          </string-name>
          ,
          <article-title>Amortized inference for gaussian process hyperparameters of structured kernels</article-title>
          ,
          <source>Conference on Uncertainty in Artificial Intelligence</source>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Andrychowicz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Denil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gómez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. W.</given-names>
            <surname>Hofman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pfau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Schaul</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Shillingford</surname>
          </string-name>
          , N. de Freitas,
          <article-title>Learning to learn by gradient descent by gradient descent</article-title>
          ,
          <source>Advances in Neural Information Processing Systems</source>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. W.</given-names>
            <surname>Hofman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. G.</given-names>
            <surname>Colmenarejo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Denil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. P.</given-names>
            <surname>Lillicrap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Botvinick</surname>
          </string-name>
          , N. de Freitas,
          <article-title>Learning to learn without gradient descent by gradient descent</article-title>
          ,
          <source>International Conference on Machine Learning</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>A.</given-names>
            <surname>Foster</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. R.</given-names>
            <surname>Ivanova</surname>
          </string-name>
          , I. Malik, T. Rainforth, Deep Adaptive Design:
          <article-title>Amortizing Sequential Bayesian Experimental Design</article-title>
          ,
          <source>International Conference on Machine Learning</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>D. R.</given-names>
            <surname>Ivanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Foster</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kleinegesse</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. U.</given-names>
            <surname>Gutmann</surname>
          </string-name>
          , T. Rainforth,
          <source>Implicit Deep Adaptive Design: Policy-Based Experimental Design without Likelihoods</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rahimi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Recht</surname>
          </string-name>
          ,
          <article-title>Random features for large-scale kernel machines</article-title>
          ,
          <source>Advances in Neural Information Processing Systems</source>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>J. T.</given-names>
            <surname>Wilson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Borovitskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Terenin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mostowsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Deisenroth</surname>
          </string-name>
          ,
          <article-title>Eficiently sampling functions from gaussian process posteriors</article-title>
          ,
          <source>International Conference on Machine Learning</source>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vaswani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shazeer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Parmar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Uszkoreit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Jones</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Gomez</surname>
          </string-name>
          , L. u. Kaiser,
          <string-name>
            <surname>I. Polosukhin</surname>
          </string-name>
          ,
          <article-title>Attention is all you need</article-title>
          ,
          <source>Advances in Neural Information Processing Systems</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>P.</given-names>
            <surname>Simionescu</surname>
          </string-name>
          ,
          <article-title>Computer-aided graphing and simulation tools for autocad users</article-title>
          ,
          <source>Computer-Aided Graphing and Simulation Tools for AutoCAD Users</source>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>A.</given-names>
            <surname>Townsend</surname>
          </string-name>
          ,
          <article-title>Constrained optimization in chebfun, chebfun</article-title>
          .org (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Rogers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. J.</given-names>
            <surname>Aftosmis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Pandya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. M.</given-names>
            <surname>Chaderjian</surname>
          </string-name>
          , E. T. T.,
          <string-name>
            <given-names>J. U.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <article-title>Automated cfd parameter studies on distributed parallel computers</article-title>
          ,
          <source>AIAA Computational Fluid Dynamics Conference</source>
          (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>L.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gao</surname>
          </string-name>
          , J. Han,
          <article-title>On the variance of the adaptive learning rate and beyond</article-title>
          ,
          <source>International Conference on Learning Representations</source>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>