首页 > 最新文献

2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)最新文献

英文 中文
Simple high-performance algorithms for scheduling jobs in the cloud 用于在云中调度作业的简单高性能算法
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447025
Javad Ghaderi
We consider the problem of scheduling VMs (Virtual Machines) in a multi-server system motivated by cloud computing applications. VMs arrive dynamically over time and require various amounts of resources (e.g., CPU, Memory, Storage, etc.) for the duration of their service. When a VM arrives, it is queued and later served by one of the servers that has sufficient remaining capacity to serve it. The scheduling of VMs is subject to: (i) packing constraints, i.e., multiple VMs can be served simultaneously by a single server if their cumulative resource requirement does not violate the capacity of the server, and (ii) non-preemption, i.e., once a VM is scheduled in a server, it cannot be interrupted or migrated to another server. To achieve maximum throughput, prior results hinge on solving a hard combinatorial problem (Knapsack) at the instances that all the servers become empty (the so-called global refresh times which require synchronization among the servers). The main contribution of this paper is that it resolves these issues. Specifically, we present a class of randomized algorithms for placing VMs in the servers that can achieve maximum throughput without preemptions. The algorithms are naturally distributed, have low complexity, and each queue needs to perform limited operations. Further, our algorithms display good delay performance in simulations, comparable to delay of heuristics that may not be throughput-optimal, and much better than the delay of the prior known throughput-optimal algorithms.
我们考虑了由云计算应用驱动的多服务器系统中的vm(虚拟机)调度问题。随着时间的推移,虚拟机动态到达,并且在其服务期间需要不同数量的资源(例如,CPU,内存,存储等)。当一个虚拟机到达时,它被排队,然后由一个有足够剩余容量的服务器来为它服务。虚拟机的调度受以下约束:(i)打包约束,即多个虚拟机可以由一台服务器同时服务,如果它们的累积资源需求不违反服务器的容量;(ii)非抢占性,即一个虚拟机一旦在一台服务器上调度,它就不能被中断或迁移到另一台服务器上。为了实现最大吞吐量,先前的结果取决于在所有服务器变为空的情况下解决一个困难的组合问题(背包)(所谓的全局刷新时间,需要服务器之间的同步)。本文的主要贡献在于解决了这些问题。具体来说,我们提出了一类随机算法,用于在服务器中放置虚拟机,可以在没有抢占的情况下实现最大吞吐量。这些算法是自然分布的,具有较低的复杂度,并且每个队列需要执行有限的操作。此外,我们的算法在模拟中显示出良好的延迟性能,与可能不是吞吐量最优的启发式算法的延迟相当,并且比先前已知的吞吐量最优算法的延迟要好得多。
{"title":"Simple high-performance algorithms for scheduling jobs in the cloud","authors":"Javad Ghaderi","doi":"10.1109/ALLERTON.2015.7447025","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447025","url":null,"abstract":"We consider the problem of scheduling VMs (Virtual Machines) in a multi-server system motivated by cloud computing applications. VMs arrive dynamically over time and require various amounts of resources (e.g., CPU, Memory, Storage, etc.) for the duration of their service. When a VM arrives, it is queued and later served by one of the servers that has sufficient remaining capacity to serve it. The scheduling of VMs is subject to: (i) packing constraints, i.e., multiple VMs can be served simultaneously by a single server if their cumulative resource requirement does not violate the capacity of the server, and (ii) non-preemption, i.e., once a VM is scheduled in a server, it cannot be interrupted or migrated to another server. To achieve maximum throughput, prior results hinge on solving a hard combinatorial problem (Knapsack) at the instances that all the servers become empty (the so-called global refresh times which require synchronization among the servers). The main contribution of this paper is that it resolves these issues. Specifically, we present a class of randomized algorithms for placing VMs in the servers that can achieve maximum throughput without preemptions. The algorithms are naturally distributed, have low complexity, and each queue needs to perform limited operations. Further, our algorithms display good delay performance in simulations, comparable to delay of heuristics that may not be throughput-optimal, and much better than the delay of the prior known throughput-optimal algorithms.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling service function chaining through routing optimization in software defined networks 在软件定义网络中通过路由优化实现业务功能链
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447056
Andrey Gushchin, A. Elwalid, A. Tang
Routing in SDN-enabled networks with middle-boxes enables high level of control over network flows so that desired level of security, efficiency and performance can be achieved. However, the new capabilities place constraints on available resources such as switch memory and middle-box processing capacity. Additionally, flow traversal constraints may also arise where each network flow has to visit certain middleboxes in a specific order. In this work, we investigate the problem of achieving global routing objectives while satisfying necessary constraints. We formulate the routing problem as an integer linear optimization problem, and propose an efficient randomized algorithm for solving it. We provide both theoretical and practical (using simulations) analysis for our algorithm. The simulations show that while other routing approaches (including greedy and previously proposed one) violate the switch memory capacity constraints (requiring 10 times more capacity in some cases), and could attain a low objective value, our algorithm satisfies all traversal and network resource constraints and achieves a high objective value.
在带有中继机的支持sdn的网络中进行路由可以实现对网络流的高级控制,从而实现所需的安全性、效率和性能。然而,新功能对可用资源(如交换机内存和中继机处理能力)施加了限制。此外,还可能出现流遍历约束,其中每个网络流必须以特定顺序访问某些中间盒。在这项工作中,我们研究了在满足必要约束的情况下实现全局路由目标的问题。我们将路由问题化为一个整数线性优化问题,并提出了一种高效的随机化算法来求解。我们为我们的算法提供了理论和实践(使用模拟)分析。仿真结果表明,其他路由方法(包括贪心路由和先前提出的路由)违反交换机内存容量约束(在某些情况下需要10倍以上的容量),可以获得较低的目标值,而我们的算法满足所有遍历和网络资源约束,可以获得较高的目标值。
{"title":"Enabling service function chaining through routing optimization in software defined networks","authors":"Andrey Gushchin, A. Elwalid, A. Tang","doi":"10.1109/ALLERTON.2015.7447056","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447056","url":null,"abstract":"Routing in SDN-enabled networks with middle-boxes enables high level of control over network flows so that desired level of security, efficiency and performance can be achieved. However, the new capabilities place constraints on available resources such as switch memory and middle-box processing capacity. Additionally, flow traversal constraints may also arise where each network flow has to visit certain middleboxes in a specific order. In this work, we investigate the problem of achieving global routing objectives while satisfying necessary constraints. We formulate the routing problem as an integer linear optimization problem, and propose an efficient randomized algorithm for solving it. We provide both theoretical and practical (using simulations) analysis for our algorithm. The simulations show that while other routing approaches (including greedy and previously proposed one) violate the switch memory capacity constraints (requiring 10 times more capacity in some cases), and could attain a low objective value, our algorithm satisfies all traversal and network resource constraints and achieves a high objective value.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Optimization theory of Hebbian/anti-Hebbian networks for PCA and whitening Hebbian/anti-Hebbian网络的PCA和美白优化理论
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447180
C. Pehlevan, D. Chklovskii
In analyzing information streamed by sensory organs, our brains face challenges similar to those solved in statistical signal processing. This suggests that biologically plausible implementations of online signal processing algorithms may model neural computation. Here, we focus on such workhorses of signal processing as Principal Component Analysis (PCA) and whitening which maximize information transmission in the presence of noise. We adopt the similarity matching framework, recently developed for principal subspace extraction, but modify the existing objective functions by adding a decorrelating term. From the modified objective functions, we derive online PCA and whitening algorithms which are implementable by neural networks with local learning rules, i.e. synaptic weight updates that depend on the activity of only pre- and postsynaptic neurons. Our theory offers a principled model of neural computations and makes testable predictions such as the dropout of underutilized neurons.
在分析由感觉器官传输的信息时,我们的大脑面临着与统计信号处理类似的挑战。这表明在线信号处理算法的生物学上可行的实现可以模拟神经计算。在这里,我们重点研究了信号处理中的主成分分析(PCA)和白化等方法,它们在存在噪声的情况下最大限度地提高了信息的传输。我们采用最近开发的用于主子空间提取的相似度匹配框架,但通过添加解相关项对现有目标函数进行了修改。根据改进的目标函数,我们推导出在线PCA和白化算法,这些算法可以通过具有局部学习规则的神经网络实现,即仅依赖于突触前和突触后神经元活动的突触权更新。我们的理论提供了一个原则性的神经计算模型,并做出了可测试的预测,例如未充分利用的神经元的丢失。
{"title":"Optimization theory of Hebbian/anti-Hebbian networks for PCA and whitening","authors":"C. Pehlevan, D. Chklovskii","doi":"10.1109/ALLERTON.2015.7447180","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447180","url":null,"abstract":"In analyzing information streamed by sensory organs, our brains face challenges similar to those solved in statistical signal processing. This suggests that biologically plausible implementations of online signal processing algorithms may model neural computation. Here, we focus on such workhorses of signal processing as Principal Component Analysis (PCA) and whitening which maximize information transmission in the presence of noise. We adopt the similarity matching framework, recently developed for principal subspace extraction, but modify the existing objective functions by adding a decorrelating term. From the modified objective functions, we derive online PCA and whitening algorithms which are implementable by neural networks with local learning rules, i.e. synaptic weight updates that depend on the activity of only pre- and postsynaptic neurons. Our theory offers a principled model of neural computations and makes testable predictions such as the dropout of underutilized neurons.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"24 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120868722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Bounded stability in networked systems with parameter mismatch and adaptive decentralized estimation 具有参数失配和自适应分散估计的网络系统的有界稳定性
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447002
S. Manaffam, A. Seyedi, A. Vosoughi, T. Javidi
Here, we study the ultimately bounded stability of network of mismatched systems using Lyapunov direct method. The upper bound on the error of oscillators from the center of the neighborhood is derived. Then the performance of an adaptive compensation via decentralized control is analyzed. Finally, the analytical results for a network of globally connected Lorenz oscillators are verified.
本文用Lyapunov直接方法研究了失匹配系统网络的最终有界稳定性。导出了振子离邻域中心误差的上界。然后分析了分散控制自适应补偿的性能。最后,对一个全局连接的洛伦兹振子网络的分析结果进行了验证。
{"title":"Bounded stability in networked systems with parameter mismatch and adaptive decentralized estimation","authors":"S. Manaffam, A. Seyedi, A. Vosoughi, T. Javidi","doi":"10.1109/ALLERTON.2015.7447002","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447002","url":null,"abstract":"Here, we study the ultimately bounded stability of network of mismatched systems using Lyapunov direct method. The upper bound on the error of oscillators from the center of the neighborhood is derived. Then the performance of an adaptive compensation via decentralized control is analyzed. Finally, the analytical results for a network of globally connected Lorenz oscillators are verified.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy-adaptive codes Energy-adaptive代码
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7446995
Haewon Jeong, P. Grover
We provide the first constructions of a new family of error-correcting codes called “energy-adaptive codes.” These codes are designed to enable adaptive circuit implementations that minimize the total system-level energy based on varying distances and target error probabilities. Recent work has explored fundamental limits and practical strategies for minimizing total (transmit + circuit) power, considering both power consumed in computational nodes as well as wires in the circuit. It is now established that to minimize total power, code choice and circuit-design should change with communication distances and/or target error probability. Motivated by circuit area constraints, the energy-adaptive codes adapt energy consumption as distances and/or target error probability change. These codes shrink and expand the wiring area they occupy as demands on the system change, adjusting the hardware by turning on and off non-local wires in the circuit. The code constructions are hierarchical, and use QC-LDPC codes as the basis. We estimate the decoding power savings attained by use of these codes through simulation results. Such codes can be of increasing utility as we enter the era of 1000 devices per person where designing the skilled labor for obtaining optimized designs for each system will simply be unavailable. While our first constructions are admittedly simplistic, the goal of the paper is to bring this new problem to the attention of the coding-theory community.
我们提供了称为“能量自适应码”的新纠错码族的第一个结构。这些代码旨在使自适应电路实现能够根据不同的距离和目标误差概率将总系统级能量最小化。最近的工作探索了最小化总(传输+电路)功率的基本限制和实用策略,同时考虑了计算节点的功耗以及电路中的导线。现在已经确定,为了最小化总功率,代码选择和电路设计应该随着通信距离和/或目标错误概率而改变。在电路面积约束的激励下,能量自适应码根据距离和/或目标误差概率的变化来调整能量消耗。随着系统需求的变化,这些代码会缩小和扩大它们所占据的布线面积,通过打开和关闭电路中的非本地电线来调整硬件。代码结构是分层的,以QC-LDPC代码为基础。我们通过仿真结果估计了使用这些码所节省的解码功率。当我们进入每人拥有1000台设备的时代时,这些代码的效用会越来越大,因为在这个时代,为每个系统设计获得优化设计的熟练劳动力将根本不可用。虽然我们的第一个结构被公认为过于简单,但本文的目标是将这个新问题引起编码理论社区的注意。
{"title":"Energy-adaptive codes","authors":"Haewon Jeong, P. Grover","doi":"10.1109/ALLERTON.2015.7446995","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7446995","url":null,"abstract":"We provide the first constructions of a new family of error-correcting codes called “energy-adaptive codes.” These codes are designed to enable adaptive circuit implementations that minimize the total system-level energy based on varying distances and target error probabilities. Recent work has explored fundamental limits and practical strategies for minimizing total (transmit + circuit) power, considering both power consumed in computational nodes as well as wires in the circuit. It is now established that to minimize total power, code choice and circuit-design should change with communication distances and/or target error probability. Motivated by circuit area constraints, the energy-adaptive codes adapt energy consumption as distances and/or target error probability change. These codes shrink and expand the wiring area they occupy as demands on the system change, adjusting the hardware by turning on and off non-local wires in the circuit. The code constructions are hierarchical, and use QC-LDPC codes as the basis. We estimate the decoding power savings attained by use of these codes through simulation results. Such codes can be of increasing utility as we enter the era of 1000 devices per person where designing the skilled labor for obtaining optimized designs for each system will simply be unavailable. While our first constructions are admittedly simplistic, the goal of the paper is to bring this new problem to the attention of the coding-theory community.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125794696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The absence of isolated node in geometric random graphs 几何随机图中孤立节点的缺失
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447099
Jun Zhao
One-dimensional geometric random graphs are constructed by distributing n nodes uniformly and independently on a unit interval and then assigning an undirected edge between any two nodes that have a distance at most τn. These graphs have received much interest and been used in various applications including wireless networks. A threshold of τn for connectivity is known as τ*n = ln n/n in the literature. In this paper, we prove that a threshold of τn for the absence of isolated node is ln n/2n (i.e., a half of the threshold τ*n). Our result shows there is a gap between thresholds of connectivity and the absence of isolated node in one-dimensional geometric random graphs; in particular, when τn equals c ln n/n for a constant c ∈ (1/2, 1), a one-dimensional geometric random graph has no isolated node but is not connected. This gap in one-dimensional geometric random graphs is in sharp contrast to the prevalent phenomenon in many other random graphs such as two-dimensional geometric random graphs, Erdös-Rényi graphs, and random intersection graphs, all of which in the asymptotic sense become connected as soon as there is no isolated node.
一维几何随机图是通过在单位间隔上均匀独立地分布n个节点,然后在任意两个距离不超过τn的节点之间分配一条无向边来构造的。这些图形引起了人们的极大兴趣,并被用于包括无线网络在内的各种应用中。在文献中,连通性的阈值τn被称为τ*n = lnn /n。在本文中,我们证明了不存在孤立节点的阈值τn是ln n/2n(即阈值τ*n的一半)。研究结果表明:一维几何随机图的连通阈值与孤立节点缺失阈值之间存在差距;特别地,对于常数c∈(1/ 2,1),当τn = c ln n/n时,一维几何随机图没有孤立节点,但不连通。一维几何随机图中的这种差距与许多其他随机图中的普遍现象形成鲜明对比,例如二维几何随机图、Erdös-Rényi图和随机交点图,所有这些图在渐近意义上只要没有孤立节点就会相互连接。
{"title":"The absence of isolated node in geometric random graphs","authors":"Jun Zhao","doi":"10.1109/ALLERTON.2015.7447099","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447099","url":null,"abstract":"One-dimensional geometric random graphs are constructed by distributing n nodes uniformly and independently on a unit interval and then assigning an undirected edge between any two nodes that have a distance at most τ<sub>n</sub>. These graphs have received much interest and been used in various applications including wireless networks. A threshold of τ<sub>n</sub> for connectivity is known as τ*<sub>n</sub> = ln n/n in the literature. In this paper, we prove that a threshold of τ<sub>n</sub> for the absence of isolated node is ln n/2n (i.e., a half of the threshold τ*<sub>n</sub>). Our result shows there is a gap between thresholds of connectivity and the absence of isolated node in one-dimensional geometric random graphs; in particular, when τ<sub>n</sub> equals c ln n/n for a constant c ∈ (1/2, 1), a one-dimensional geometric random graph has no isolated node but is not connected. This gap in one-dimensional geometric random graphs is in sharp contrast to the prevalent phenomenon in many other random graphs such as two-dimensional geometric random graphs, Erdös-Rényi graphs, and random intersection graphs, all of which in the asymptotic sense become connected as soon as there is no isolated node.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129471330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dirty-paper integer-forcing 脏纸integer-forcing
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447125
Wenbo He, B. Nazer, S. Shamai
Consider a Gaussian multiple-input multiple-output (MIMO) multiple-access channel (MAC) with channel matrix H and a Gaussian MIMO broadcast channel (BC) with channel matrix Hτ. For the MIMO MAC, the integer-forcing architecture consists of first decoding integer-linear combinations of the transmitted codewords, which are then solved for the original messages. For the MIMO BC, the integer-forcing architecture consists of pre-inverting the integer-linear combinations at the transmitter so that each receiver can obtain its desired codeword by decoding an integer-linear combination. In both cases, integer-forcing offers higher achievable rates than zero-forcing. In recent work, we established an uplink-downlink duality relationship for integer-forcing, i.e., we showed that any rate tuple that is achievable via integer-forcing on the MIMO MAC can be achieved via integer-forcing on the MIMO BC with the same sum power and vice versa. It has also been shown that integer-forcing for the MIMO MAC can be enhanced via successive cancellation. Here, we introduce dirty-paper integer-forcing for the MIMO BC and establish uplink-downlink duality with successive integer-forcing for the MIMO MAC.
考虑一个信道矩阵为H的高斯多输入多输出(MIMO)多接入信道(MAC)和一个信道矩阵为Hτ的高斯MIMO广播信道(BC)。对于MIMO MAC,整数强制结构包括首先解码传输码字的整数线性组合,然后对原始消息进行求解。对于MIMO BC,整数强制结构包括在发送端对整数-线性组合进行预反转,以便每个接收端通过解码整数-线性组合获得所需的码字。在这两种情况下,积分强制比零强制提供更高的可实现速率。在最近的工作中,我们建立了整数强制的上行链路-下行链路对偶关系,即我们表明,通过在MIMO MAC上进行整数强制可以实现的任何速率元组都可以通过在MIMO BC上进行整数强制获得相同的和功率,反之亦然。研究还表明,MIMO MAC的整数强制可以通过连续消去来增强。在这里,我们引入了用于MIMO BC的脏纸整数强制,并建立了用于MIMO MAC的连续整数强制的上行-下行对偶性。
{"title":"Dirty-paper integer-forcing","authors":"Wenbo He, B. Nazer, S. Shamai","doi":"10.1109/ALLERTON.2015.7447125","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447125","url":null,"abstract":"Consider a Gaussian multiple-input multiple-output (MIMO) multiple-access channel (MAC) with channel matrix H and a Gaussian MIMO broadcast channel (BC) with channel matrix Hτ. For the MIMO MAC, the integer-forcing architecture consists of first decoding integer-linear combinations of the transmitted codewords, which are then solved for the original messages. For the MIMO BC, the integer-forcing architecture consists of pre-inverting the integer-linear combinations at the transmitter so that each receiver can obtain its desired codeword by decoding an integer-linear combination. In both cases, integer-forcing offers higher achievable rates than zero-forcing. In recent work, we established an uplink-downlink duality relationship for integer-forcing, i.e., we showed that any rate tuple that is achievable via integer-forcing on the MIMO MAC can be achieved via integer-forcing on the MIMO BC with the same sum power and vice versa. It has also been shown that integer-forcing for the MIMO MAC can be enhanced via successive cancellation. Here, we introduce dirty-paper integer-forcing for the MIMO BC and establish uplink-downlink duality with successive integer-forcing for the MIMO MAC.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129756391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Consensus-based distributed optimization with malicious nodes 基于共识的恶意节点分布式优化
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447011
S. Sundaram, B. Gharesifard
We investigate the vulnerabilities of consensus-based distributed optimization protocols to nodes that deviate from the prescribed update rule (e.g., due to failures or adversarial attacks). After characterizing certain fundamental limitations on the performance of any distributed optimization algorithm in the presence of adversaries, we propose a robust consensus-based distributed optimization algorithm that is guaranteed to converge to the convex hull of the set of minimizers of the non-adversarial nodes' functions. We also study the distance-to-optimality properties of our proposed robust algorithm in terms of F-local sets of the graph. We show that finding the largest size of such sets is NP-hard.
我们研究了基于共识的分布式优化协议对偏离规定更新规则的节点的漏洞(例如,由于失败或对抗性攻击)。在描述了存在对手时任何分布式优化算法性能的某些基本限制之后,我们提出了一种鲁棒的基于共识的分布式优化算法,该算法保证收敛于非对抗节点函数的最小值集的凸包。我们还研究了我们提出的鲁棒算法在图的f局部集上的距离至最优性性质。我们证明了找到这样的集合的最大大小是np困难的。
{"title":"Consensus-based distributed optimization with malicious nodes","authors":"S. Sundaram, B. Gharesifard","doi":"10.1109/ALLERTON.2015.7447011","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447011","url":null,"abstract":"We investigate the vulnerabilities of consensus-based distributed optimization protocols to nodes that deviate from the prescribed update rule (e.g., due to failures or adversarial attacks). After characterizing certain fundamental limitations on the performance of any distributed optimization algorithm in the presence of adversaries, we propose a robust consensus-based distributed optimization algorithm that is guaranteed to converge to the convex hull of the set of minimizers of the non-adversarial nodes' functions. We also study the distance-to-optimality properties of our proposed robust algorithm in terms of F-local sets of the graph. We show that finding the largest size of such sets is NP-hard.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Cache-enabled broadcast packet erasure channels with state feedback 带状态反馈的启用缓存的广播包擦除通道
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447178
Asma Ghorbel, M. Kobayashi, Sheng Yang
We consider a cache-enabled K-user broadcast erasure packet channel in which a server with a library of N files wishes to deliver a requested file to each user who is equipped with a cache of a finite memory M. Assuming that the transmitter has state feedback and user caches can be filled during off-peak hours reliably by decentralized cache placement, we characterize the optimal rate region as a function of the memory size, the erasure probability. The proposed delivery scheme, based on the scheme proposed by Gatzianas et al., exploits the receiver side information established during the placement phase. Our results enable us to quantify the net benefits of decentralized coded caching in the presence of erasure. The role of state feedback is found useful especially when the erasure probability is large and/or the normalized memory size is small.
我们考虑一个启用缓存的k用户广播擦除数据包通道,其中具有N个文件库的服务器希望向每个配备有限内存m缓存的用户发送请求的文件。假设发射器具有状态反馈并且用户缓存可以在非高峰时段通过分散缓存放置可靠地填充,我们将最优速率区域表征为内存大小的函数,擦除概率。提出的交付方案基于Gatzianas等人提出的方案,利用在放置阶段建立的接收方信息。我们的结果使我们能够量化在擦除存在的情况下分散编码缓存的净收益。状态反馈的作用被发现是有用的,特别是当擦除概率很大和/或标准化内存大小很小的时候。
{"title":"Cache-enabled broadcast packet erasure channels with state feedback","authors":"Asma Ghorbel, M. Kobayashi, Sheng Yang","doi":"10.1109/ALLERTON.2015.7447178","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447178","url":null,"abstract":"We consider a cache-enabled K-user broadcast erasure packet channel in which a server with a library of N files wishes to deliver a requested file to each user who is equipped with a cache of a finite memory M. Assuming that the transmitter has state feedback and user caches can be filled during off-peak hours reliably by decentralized cache placement, we characterize the optimal rate region as a function of the memory size, the erasure probability. The proposed delivery scheme, based on the scheme proposed by Gatzianas et al., exploits the receiver side information established during the placement phase. Our results enable us to quantify the net benefits of decentralized coded caching in the presence of erasure. The role of state feedback is found useful especially when the erasure probability is large and/or the normalized memory size is small.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131307080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Coding schemes for discrete memoryless multicast networks with and without feedback 有反馈和无反馈离散无记忆多播网络的编码方案
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447048
Youlong Wu
Coding scheme for discrete memoryless multicast networks with rate-limited feedback from the receivers and relays to the transmitter is proposed. The coding scheme is based on block-Markov coding, joint backward decoding and hybrid relaying strategy. In each block, the relays use partial decode-forward strategy to decode part of the source message. Meanwhile, the receivers and relays use compress-forward strategy to compress their channel outputs and send the compression indices to the transmitter through the feedback links. In the next block, after obtaining the compression indices, the transmitter sends them together with the source message. Each receiver uses backward decoding to jointly decode the source message and all compression indices. It is shown that our coding scheme generalizes Gabbai and Bross's results for the single relay channel with partial feedback, where they proposed coding schemes based on restricted decoding and deterministic partitioning. For the single relay channel with relay-transmitter feedback, our coding scheme can strictly improve on noisy network coding, distributed decode-forward coding and all known lower bounds on the achievable rate in the absence of feedback. Furthermore, motivated by the feedback coding scheme, we propose a new coding scheme for discrete memoryless multicast networks without feedback, which also improves noisy network coding and distributed decode-forward coding.
提出了一种离散无记忆多播网络的编码方案,该网络具有接收端和中继端对发送端的速率限制反馈。该编码方案基于分组马尔可夫编码、联合反向解码和混合中继策略。在每个数据块中,中继使用部分解码转发策略对部分源消息进行解码。同时,接收端和中继端采用前向压缩策略对各自信道输出进行压缩,并通过反馈链路将压缩指标发送给发送端。在下一个块中,在获得压缩指数后,发送器将其与源消息一起发送。每个接收端采用反向解码的方式对源报文和所有压缩索引进行联合解码。我们的编码方案推广了Gabbai和Bross的部分反馈单中继信道的结果,他们提出了基于受限解码和确定性划分的编码方案。对于具有中继-发射机反馈的单中继信道,我们的编码方案可以严格改进无反馈情况下的噪声网络编码、分布式前向译码和所有已知的可达率下界。此外,在反馈编码方案的激励下,我们提出了一种新的无反馈离散无记忆组播网络编码方案,改进了噪声网络编码和分布式前向译码。
{"title":"Coding schemes for discrete memoryless multicast networks with and without feedback","authors":"Youlong Wu","doi":"10.1109/ALLERTON.2015.7447048","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447048","url":null,"abstract":"Coding scheme for discrete memoryless multicast networks with rate-limited feedback from the receivers and relays to the transmitter is proposed. The coding scheme is based on block-Markov coding, joint backward decoding and hybrid relaying strategy. In each block, the relays use partial decode-forward strategy to decode part of the source message. Meanwhile, the receivers and relays use compress-forward strategy to compress their channel outputs and send the compression indices to the transmitter through the feedback links. In the next block, after obtaining the compression indices, the transmitter sends them together with the source message. Each receiver uses backward decoding to jointly decode the source message and all compression indices. It is shown that our coding scheme generalizes Gabbai and Bross's results for the single relay channel with partial feedback, where they proposed coding schemes based on restricted decoding and deterministic partitioning. For the single relay channel with relay-transmitter feedback, our coding scheme can strictly improve on noisy network coding, distributed decode-forward coding and all known lower bounds on the achievable rate in the absence of feedback. Furthermore, motivated by the feedback coding scheme, we propose a new coding scheme for discrete memoryless multicast networks without feedback, which also improves noisy network coding and distributed decode-forward coding.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1