首页 > 最新文献

2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)最新文献

英文 中文
Queueing analysis of service deferrals for load management in power systems 电力系统负荷管理中的服务延迟排队分析
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7446990
Andrés Ferragut, F. Paganini
With the advent of renewable sources and Smart-Grid deployments, it is increasingly common to control demands in order to reduce power consumption variability and thus the need for regulation, with load aggregators now exploiting the deferability of some power loads to smooth the consumption profile. In this paper, we analyze the impact of service deferrals and scheduling on power consumption variability using tools from queueing theory. We consider a generic model for a load aggregator that receive job requests, involving a certain amount of energy to be provided and a deadline. We analyze different scheduling policies and examine the impact of service deferrals, quantifying the tradeoff between variance reduction and attained deadlines.
随着可再生能源和智能电网部署的出现,控制需求以减少电力消耗的可变性,从而减少对监管的需求越来越普遍,负载聚合器现在利用一些电力负载的可延期性来平滑消费概况。本文利用排队理论中的工具分析了服务延迟和调度对电力消耗可变性的影响。我们考虑一个接收作业请求的负载聚合器的通用模型,其中涉及要提供的一定数量的能量和截止日期。我们分析了不同的调度策略,并检查了服务延迟的影响,量化了方差减少和达到最后期限之间的权衡。
{"title":"Queueing analysis of service deferrals for load management in power systems","authors":"Andrés Ferragut, F. Paganini","doi":"10.1109/ALLERTON.2015.7446990","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7446990","url":null,"abstract":"With the advent of renewable sources and Smart-Grid deployments, it is increasingly common to control demands in order to reduce power consumption variability and thus the need for regulation, with load aggregators now exploiting the deferability of some power loads to smooth the consumption profile. In this paper, we analyze the impact of service deferrals and scheduling on power consumption variability using tools from queueing theory. We consider a generic model for a load aggregator that receive job requests, involving a certain amount of energy to be provided and a deadline. We analyze different scheduling policies and examine the impact of service deferrals, quantifying the tradeoff between variance reduction and attained deadlines.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123329107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On proactive caching with demand and channel uncertainties 关于需求和通道不确定的主动缓存
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447141
L. S. Muppirisetty, John Tadrous, A. Eryilmaz, H. Wymeersch
Mobile data traffic has surpassed that of voice to become the main component of the system load of today's wireless networks. Recent studies indicate that the data demand patterns of mobile users are predictable. Moreover, the channel quality of mobile users along their navigation paths is predictable by exploiting their location information. This work aims at fusing the statistically predictable demand and channel patterns in devising proactive caching strategies that alleviate network congestion. Specifically, we establish a fundamental bound on the minimum possible cost achievable by any proactive scheduler under time-invariant demand and channel statistics as a function of their prediction uncertainties, and develop an asymptotically optimal proactive service policy that attains this bound as the prediction window grows. In addition, the established bound yields insights on how the demand and channel statistics affect proactive caching decisions. We reveal some of these insights through numerical investigations.
移动数据流量已经超过语音流量,成为当今无线网络系统负载的主要组成部分。最近的研究表明,移动用户的数据需求模式是可预测的。此外,利用移动用户的位置信息,可以预测其导航路径上的信道质量。这项工作旨在融合统计上可预测的需求和通道模式,以设计缓解网络拥塞的主动缓存策略。具体地说,我们建立了在定常需求和信道统计的情况下,任何主动调度器可实现的最小可能成本的基本界,作为其预测不确定性的函数,并开发了一个随着预测窗口的增长而达到该界的渐近最优主动服务策略。此外,已建立的绑定可以深入了解需求和通道统计信息如何影响主动缓存决策。我们通过数值研究揭示了其中的一些见解。
{"title":"On proactive caching with demand and channel uncertainties","authors":"L. S. Muppirisetty, John Tadrous, A. Eryilmaz, H. Wymeersch","doi":"10.1109/ALLERTON.2015.7447141","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447141","url":null,"abstract":"Mobile data traffic has surpassed that of voice to become the main component of the system load of today's wireless networks. Recent studies indicate that the data demand patterns of mobile users are predictable. Moreover, the channel quality of mobile users along their navigation paths is predictable by exploiting their location information. This work aims at fusing the statistically predictable demand and channel patterns in devising proactive caching strategies that alleviate network congestion. Specifically, we establish a fundamental bound on the minimum possible cost achievable by any proactive scheduler under time-invariant demand and channel statistics as a function of their prediction uncertainties, and develop an asymptotically optimal proactive service policy that attains this bound as the prediction window grows. In addition, the established bound yields insights on how the demand and channel statistics affect proactive caching decisions. We reveal some of these insights through numerical investigations.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126723071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Mean-variance and value at risk in multi-armed bandit problems 多武装盗匪问题的均值方差和风险值
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447162
Sattar Vakili, Qing Zhao
We study risk-averse multi-armed bandit problems under different risk measures. We consider three risk mitigation models. In the first model, the variations in the reward values obtained at different times are considered as risk and the objective is to minimize the mean-variance of the observed rewards. In the second and the third models, the quantity of interest is the total reward at the end of the time horizon, and the objective is to minimize the mean-variance and maximize the value at risk of the total reward, respectively. We develop risk-averse online learning policies and analyze their regret performance. We also provide tight lower bounds on regret under the model of mean-variance of observations.
研究了不同风险度量下的风险规避型多武装盗匪问题。我们考虑了三种风险缓解模型。在第一个模型中,不同时间获得的奖励值的变化被视为风险,目标是最小化观察到的奖励的均值方差。在第二个和第三个模型中,利息的数量是在时间范围结束时的总回报,目标分别是最小化平均方差和最大化总回报的风险值。我们制定了规避风险的在线学习政策,并分析了它们的后悔表现。我们还在观测的均值-方差模型下提供了遗憾的严格下界。
{"title":"Mean-variance and value at risk in multi-armed bandit problems","authors":"Sattar Vakili, Qing Zhao","doi":"10.1109/ALLERTON.2015.7447162","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447162","url":null,"abstract":"We study risk-averse multi-armed bandit problems under different risk measures. We consider three risk mitigation models. In the first model, the variations in the reward values obtained at different times are considered as risk and the objective is to minimize the mean-variance of the observed rewards. In the second and the third models, the quantity of interest is the total reward at the end of the time horizon, and the objective is to minimize the mean-variance and maximize the value at risk of the total reward, respectively. We develop risk-averse online learning policies and analyze their regret performance. We also provide tight lower bounds on regret under the model of mean-variance of observations.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115571187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Utility fair RAT selection in multi-homed LTE/802.11 networks 多主LTE/802.11网络中的实用公平RAT选择
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447057
Bahar Partov, D. Leith
We consider proportional fair rate allocation in a heterogeneous network with a mix of LTE and 802.11 Radio Access Technologies (RATs) which supports multipath and multi-homed operation (simultaneous connection of a user device to multiple LTE BSs and one 802.11 AP). We show that the utility fair optimisation problem is non-convex but that a global optimum can be found by solving a sequence of convex optimisations in a distributed fashion. The result is a principled approach to offload from LTE to 802.11 and for exploiting LTE/802.11 path diversity to meet user traffic demands.
我们考虑在混合LTE和802.11无线接入技术(rat)的异构网络中按比例公平分配速率,该网络支持多路径和多归属操作(同时连接用户设备到多个LTE BSs和一个802.11 AP)。我们表明,效用公平优化问题是非凸的,但可以通过以分布式方式解决一系列凸优化来找到全局最优。其结果是一种原则性的方法,可以从LTE卸载到802.11,并利用LTE/802.11路径多样性来满足用户流量需求。
{"title":"Utility fair RAT selection in multi-homed LTE/802.11 networks","authors":"Bahar Partov, D. Leith","doi":"10.1109/ALLERTON.2015.7447057","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447057","url":null,"abstract":"We consider proportional fair rate allocation in a heterogeneous network with a mix of LTE and 802.11 Radio Access Technologies (RATs) which supports multipath and multi-homed operation (simultaneous connection of a user device to multiple LTE BSs and one 802.11 AP). We show that the utility fair optimisation problem is non-convex but that a global optimum can be found by solving a sequence of convex optimisations in a distributed fashion. The result is a principled approach to offload from LTE to 802.11 and for exploiting LTE/802.11 path diversity to meet user traffic demands.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114123628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting memory in dynamic average consensus 利用动态平均共识的记忆
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447013
Bryan Van Scoy, R. Freeman, K. Lynch
In the discrete-time average consensus problem, each agent in a network has a local input and communicates with neighboring agents to calculate the global average of all agent inputs. We analyze diffusion-like algorithms where each agent maintains an internal state which it updates at each time step using its local input together with information it receives from neighboring agents. The agent's estimate of the global average input is then a local function of its internal state. Local memory on each agent can be used to enhance the performance of average consensus estimators in several ways. Agents can use memory to store both internal state variables as well as intermediate diffusion calculations within each time step. We exploit memory to design two types of estimators. First, we design feedback estimators which track constant input signals with zero steady-state error. Such estimators produce estimates that converge exponentially to the global average, and we consider the cost of an estimator to be the largest time constant of the exponential decay of its estimation errors. However, we measure time using normalized units of communicated real variables per agent, so that estimators requiring more communication per time step are potentially costlier even if they converge in fewer time steps. We then show that a certain estimator having two internal state variables and one diffusion calculation per time step achieves the minimal cost over all graphs and all estimators with one or two states no matter how many intermediate diffusion calculations are stored. Second, we design a feedforward estimator which tracks time-varying signals whose frequencies lie below some cut-off frequency. The steady-state error is finite, but can be made arbitrarily small using enough diffusion calculations per time step.
在离散时间平均共识问题中,网络中的每个智能体都有一个局部输入,并与相邻的智能体通信,计算所有智能体输入的全局平均值。我们分析了类似扩散的算法,其中每个代理保持一个内部状态,并在每个时间步使用其本地输入和从相邻代理接收的信息进行更新。代理对全局平均输入的估计是其内部状态的局部函数。每个代理上的本地内存可以通过几种方式来增强平均一致性估计器的性能。代理可以使用内存来存储内部状态变量以及每个时间步内的中间扩散计算。我们利用内存设计两种类型的估计器。首先,我们设计了反馈估计器,跟踪恒定输入信号,稳态误差为零。这样的估计器产生的估计是指数收敛到全球平均,我们认为估计器的成本是其估计误差指数衰减的最大时间常数。然而,我们使用每个代理的通信真实变量的标准化单位来测量时间,因此每个时间步需要更多通信的估计器可能更昂贵,即使它们在更少的时间步内收敛。然后,我们证明了无论存储多少中间扩散计算,具有两个内部状态变量和每个时间步一个扩散计算的某个估计器在所有图和所有具有一个或两个状态的估计器上实现最小代价。其次,我们设计了一个前馈估计器来跟踪频率低于某个截止频率的时变信号。稳态误差是有限的,但可以使任意小使用足够的扩散计算每个时间步。
{"title":"Exploiting memory in dynamic average consensus","authors":"Bryan Van Scoy, R. Freeman, K. Lynch","doi":"10.1109/ALLERTON.2015.7447013","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447013","url":null,"abstract":"In the discrete-time average consensus problem, each agent in a network has a local input and communicates with neighboring agents to calculate the global average of all agent inputs. We analyze diffusion-like algorithms where each agent maintains an internal state which it updates at each time step using its local input together with information it receives from neighboring agents. The agent's estimate of the global average input is then a local function of its internal state. Local memory on each agent can be used to enhance the performance of average consensus estimators in several ways. Agents can use memory to store both internal state variables as well as intermediate diffusion calculations within each time step. We exploit memory to design two types of estimators. First, we design feedback estimators which track constant input signals with zero steady-state error. Such estimators produce estimates that converge exponentially to the global average, and we consider the cost of an estimator to be the largest time constant of the exponential decay of its estimation errors. However, we measure time using normalized units of communicated real variables per agent, so that estimators requiring more communication per time step are potentially costlier even if they converge in fewer time steps. We then show that a certain estimator having two internal state variables and one diffusion calculation per time step achieves the minimal cost over all graphs and all estimators with one or two states no matter how many intermediate diffusion calculations are stored. Second, we design a feedforward estimator which tracks time-varying signals whose frequencies lie below some cut-off frequency. The steady-state error is finite, but can be made arbitrarily small using enough diffusion calculations per time step.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fundamental limitations for anonymous distributed systems with broadcast communications 具有广播通信的匿名分布式系统的基本限制
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7446980
J. Hendrickx, J. Tsitsiklis
We consider deterministic anonymous distributed systems with broadcast communications where each node has some initial value, and the goal is to compute a function of all these values. We show that only a very restricted set of functions can be computed if the nodes do not know (and cannot use) the number of their out-neighbors. Our results remain valid even if nodes know the precise structure of the network but do not know where they lie within the structure. They also remain valid if nodes know their out-degree up to an uncertainty of 1. These results are a variation of those obtained by Boldi and Vigna (1997) for a weaker computation model. As a consequence, computing more complex functions in the context of broadcast communications requires the explicit or implicit knowledge or use of either (a) the out-degree of each node, (b) global node identifiers, (c) randomization, or (d) asynchronous updates with specific properties.
我们考虑具有广播通信的确定性匿名分布式系统,其中每个节点都有一些初始值,目标是计算所有这些值的函数。我们表明,如果节点不知道(并且不能使用)其外部邻居的数量,则只能计算一组非常有限的函数。即使节点知道网络的精确结构,但不知道它们在结构中的位置,我们的结果仍然有效。如果节点知道它们的out度到不确定性为1,它们也仍然有效。这些结果是Boldi和Vigna(1997)在较弱的计算模型中得到的结果的变化。因此,在广播通信环境中计算更复杂的函数需要明确或隐含地了解或使用(a)每个节点的出度,(b)全局节点标识符,(c)随机化,或(d)具有特定属性的异步更新。
{"title":"Fundamental limitations for anonymous distributed systems with broadcast communications","authors":"J. Hendrickx, J. Tsitsiklis","doi":"10.1109/ALLERTON.2015.7446980","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7446980","url":null,"abstract":"We consider deterministic anonymous distributed systems with broadcast communications where each node has some initial value, and the goal is to compute a function of all these values. We show that only a very restricted set of functions can be computed if the nodes do not know (and cannot use) the number of their out-neighbors. Our results remain valid even if nodes know the precise structure of the network but do not know where they lie within the structure. They also remain valid if nodes know their out-degree up to an uncertainty of 1. These results are a variation of those obtained by Boldi and Vigna (1997) for a weaker computation model. As a consequence, computing more complex functions in the context of broadcast communications requires the explicit or implicit knowledge or use of either (a) the out-degree of each node, (b) global node identifiers, (c) randomization, or (d) asynchronous updates with specific properties.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130658904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Distortion-memory tradeoffs in cache-aided wireless video delivery 缓存辅助无线视频传输中的失真-记忆权衡
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447138
Parisa Hassanzadeh, E. Erkip, J. Llorca, A. Tulino
Mobile network operators are considering caching as one of the strategies to keep up with the increasing demand for high-definition wireless video streaming. By prefetching popular content into memory at wireless access points or end user devices, requests can be served locally, relieving strain on expensive backhaul. In addition, using network coding allows the simultaneous serving of distinct cache misses via common coded multicast transmissions, resulting in significantly larger load reductions compared to those achieved with conventional delivery schemes. However, prior work does not exploit the properties of video and simply treats content as fixed-size files that users would like to fully download. Our work is motivated by the fact that video can be coded in a scalable fashion and that the decoded video quality depends on the number of layers a user is able to receive. Using a Gaussian source model, caching and coded delivery methods are designed to minimize the squared error distortion at end user devices. Our work is general enough to consider heterogeneous cache sizes and video popularity distributions.
移动网络运营商正在考虑将缓存作为跟上高清无线视频流日益增长的需求的策略之一。通过在无线接入点或终端用户设备上预取流行内容到内存中,请求可以在本地提供,从而减轻昂贵的回程的压力。此外,使用网络编码允许通过公共编码多播传输同时服务不同的缓存缺失,与使用传统交付方案相比,可以显著减少负载。然而,之前的工作并没有利用视频的属性,只是将内容视为用户想要完全下载的固定大小的文件。我们的工作的动机是视频可以以可扩展的方式编码,并且解码的视频质量取决于用户能够接收的层数。使用高斯源模型,缓存和编码传输方法被设计为最小化最终用户设备的平方误差失真。我们的工作足够通用,可以考虑异构缓存大小和视频流行度分布。
{"title":"Distortion-memory tradeoffs in cache-aided wireless video delivery","authors":"Parisa Hassanzadeh, E. Erkip, J. Llorca, A. Tulino","doi":"10.1109/ALLERTON.2015.7447138","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447138","url":null,"abstract":"Mobile network operators are considering caching as one of the strategies to keep up with the increasing demand for high-definition wireless video streaming. By prefetching popular content into memory at wireless access points or end user devices, requests can be served locally, relieving strain on expensive backhaul. In addition, using network coding allows the simultaneous serving of distinct cache misses via common coded multicast transmissions, resulting in significantly larger load reductions compared to those achieved with conventional delivery schemes. However, prior work does not exploit the properties of video and simply treats content as fixed-size files that users would like to fully download. Our work is motivated by the fact that video can be coded in a scalable fashion and that the decoded video quality depends on the number of layers a user is able to receive. Using a Gaussian source model, caching and coded delivery methods are designed to minimize the squared error distortion at end user devices. Our work is general enough to consider heterogeneous cache sizes and video popularity distributions.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128909279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Stochastic optimization for deep CCA via nonlinear orthogonal iterations 基于非线性正交迭代的深度CCA随机优化
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447071
Weiran Wang, R. Arora, Karen Livescu, N. Srebro
Deep CCA is a recently proposed deep neural network extension to the traditional canonical correlation analysis (CCA), and has been successful for multi-view representation learning in several domains. However, stochastic optimization of the deep CCA objective is not straightforward, because it does not decouple over training examples. Previous optimizers for deep CCA are either batch-based algorithms or stochastic optimization using large minibatches, which can have high memory consumption. In this paper, we tackle the problem of stochastic optimization for deep CCA with small minibatches, based on an iterative solution to the CCA objective, and show that we can achieve as good performance as previous optimizers and thus alleviate the memory requirement.
深度关联分析(Deep CCA)是近年来在传统典型相关分析(CCA)基础上提出的一种深度神经网络扩展方法,在多个领域的多视图表示学习中取得了成功。然而,深度CCA目标的随机优化并不简单,因为它不能在训练样本上解耦。以前的深度CCA优化器要么是基于批处理的算法,要么是使用大minibatch的随机优化,这可能会有很高的内存消耗。在本文中,我们基于对CCA目标的迭代求解,解决了小批量深度CCA的随机优化问题,并表明我们可以获得与以前的优化器一样好的性能,从而减轻了内存需求。
{"title":"Stochastic optimization for deep CCA via nonlinear orthogonal iterations","authors":"Weiran Wang, R. Arora, Karen Livescu, N. Srebro","doi":"10.1109/ALLERTON.2015.7447071","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447071","url":null,"abstract":"Deep CCA is a recently proposed deep neural network extension to the traditional canonical correlation analysis (CCA), and has been successful for multi-view representation learning in several domains. However, stochastic optimization of the deep CCA objective is not straightforward, because it does not decouple over training examples. Previous optimizers for deep CCA are either batch-based algorithms or stochastic optimization using large minibatches, which can have high memory consumption. In this paper, we tackle the problem of stochastic optimization for deep CCA with small minibatches, based on an iterative solution to the CCA objective, and show that we can achieve as good performance as previous optimizers and thus alleviate the memory requirement.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115344364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Distributed estimation of betweenness centrality 中间性中心性的分布估计
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447012
Wei Wang, Choon Yik Tang
Betweenness centrality is a fundamental centrality measure that quantifies how important a node or an edge is, within a network, based on how often it lies on the shortest paths between all pairs of nodes. In this paper, we develop a scalable distributed algorithm, which enables every node in a network to estimate its own betweenness and the betweenness of edges incident on it with only local interaction and without any centralized coordination, nor high memory usages. The development is based on exploiting various local properties of shortest paths, and on formulating and solving an unconstrained distributed optimization problem. We also evaluate the algorithm performance via simulation on a number of random geometric graphs, showing that it yields betweenness estimates that are fairly accurate in terms of ordering.
中间中心性是一种基本的中心性度量,它量化了一个节点或一条边在网络中的重要性,基于它位于所有节点对之间的最短路径上的频率。在本文中,我们开发了一种可扩展的分布式算法,该算法使网络中的每个节点仅通过局部交互,不需要任何集中协调,也不需要高内存占用,即可估计其自身和发生在其上的边的之间性。该方法的发展是基于利用最短路径的各种局部性质,以及建立和求解无约束分布优化问题。我们还通过对许多随机几何图的模拟来评估算法的性能,表明它产生的间隔估计在排序方面相当准确。
{"title":"Distributed estimation of betweenness centrality","authors":"Wei Wang, Choon Yik Tang","doi":"10.1109/ALLERTON.2015.7447012","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447012","url":null,"abstract":"Betweenness centrality is a fundamental centrality measure that quantifies how important a node or an edge is, within a network, based on how often it lies on the shortest paths between all pairs of nodes. In this paper, we develop a scalable distributed algorithm, which enables every node in a network to estimate its own betweenness and the betweenness of edges incident on it with only local interaction and without any centralized coordination, nor high memory usages. The development is based on exploiting various local properties of shortest paths, and on formulating and solving an unconstrained distributed optimization problem. We also evaluate the algorithm performance via simulation on a number of random geometric graphs, showing that it yields betweenness estimates that are fairly accurate in terms of ordering.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114551404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Covert communications on Poisson packet channels 泊松包信道上的秘密通信
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447124
Ramin Soltani, D. Goeckel, D. Towsley, A. Houmansadr
Consider a channel where authorized transmitter Jack sends packets to authorized receiver Steve according to a Poisson process with rate λ packets per second for a time period T. Suppose that covert transmitter Alice wishes to communicate information to covert receiver Bob on the same channel without being detected by a watchful adversary Willie. We consider two scenarios. In the first scenario, we assume that warden Willie cannot look at packet contents but rather can only observe packet timings, and Alice must send information by inserting her own packets into the channel. We show that the number of packets that Alice can covertly transmit to Bob is on the order of the square root of the number of packets that Jack transmits to Steve; conversely, if Alice transmits more than that, she will be detected by Willie with high probability. In the second scenario, we assume that Willie can look at packet contents but that Alice can communicate across an M/M/1 queue to Bob by altering the timings of the packets going from Jack to Steve. First, Alice builds a codebook, with each codeword consisting of a sequence of packet timings to be employed for conveying the information associated with that codeword. However, to successfully employ this codebook, Alice must always have a packet to send at the appropriate time. Hence, leveraging our result from the first scenario, we propose a construction where Alice covertly slows down the packet stream so as to buffer packets to use during a succeeding codeword transmission phase. Using this approach, Alice can covertly and reliably transmit O(λT) covert bits to Bob in time period T over an M/M/1 queue with service rate μ > e · λ.
考虑一个信道,授权发送者Jack按照泊松过程以每秒λ包的速率向授权接收者Steve发送数据包,持续一段时间为t。假设隐蔽发送者Alice希望在同一信道上向隐蔽接收者Bob发送信息,而不被警惕的对手Willie发现。我们考虑两种情况。在第一个场景中,我们假设狱长Willie不能查看包的内容,而只能观察包的计时,而Alice必须通过将自己的包插入信道来发送信息。我们证明,Alice可以秘密传输给Bob的数据包数量是Jack传输给Steve的数据包数量的平方根的数量级;相反,如果Alice传送的信息超过这个数,她就很有可能被Willie发现。在第二个场景中,我们假设Willie可以查看数据包内容,但是Alice可以通过改变从Jack到Steve的数据包的时间,通过M/M/1队列与Bob通信。首先,Alice构建一个码本,其中每个码字由一系列数据包计时组成,用于传递与该码字相关的信息。然而,为了成功地使用这个码本,Alice必须总是在适当的时间发送一个数据包。因此,利用我们从第一个场景得到的结果,我们提出了一种构造,其中Alice暗中减慢数据包流,以便缓冲数据包,以便在随后的码字传输阶段使用。利用该方法,Alice可以在服务速率μ > e·λ的M/M/1队列上,在T时间段内向Bob隐蔽可靠地传输O(λT)个隐蔽比特。
{"title":"Covert communications on Poisson packet channels","authors":"Ramin Soltani, D. Goeckel, D. Towsley, A. Houmansadr","doi":"10.1109/ALLERTON.2015.7447124","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447124","url":null,"abstract":"Consider a channel where authorized transmitter Jack sends packets to authorized receiver Steve according to a Poisson process with rate λ packets per second for a time period T. Suppose that covert transmitter Alice wishes to communicate information to covert receiver Bob on the same channel without being detected by a watchful adversary Willie. We consider two scenarios. In the first scenario, we assume that warden Willie cannot look at packet contents but rather can only observe packet timings, and Alice must send information by inserting her own packets into the channel. We show that the number of packets that Alice can covertly transmit to Bob is on the order of the square root of the number of packets that Jack transmits to Steve; conversely, if Alice transmits more than that, she will be detected by Willie with high probability. In the second scenario, we assume that Willie can look at packet contents but that Alice can communicate across an M/M/1 queue to Bob by altering the timings of the packets going from Jack to Steve. First, Alice builds a codebook, with each codeword consisting of a sequence of packet timings to be employed for conveying the information associated with that codeword. However, to successfully employ this codebook, Alice must always have a packet to send at the appropriate time. Hence, leveraging our result from the first scenario, we propose a construction where Alice covertly slows down the packet stream so as to buffer packets to use during a succeeding codeword transmission phase. Using this approach, Alice can covertly and reliably transmit O(λT) covert bits to Bob in time period T over an M/M/1 queue with service rate μ > e · λ.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117266873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1