首页 > 最新文献

2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)最新文献

英文 中文
Resilience for Consensus-based Distributed Algorithms in Hostile Environment† 基于共识的分布式算法在敌对环境中的复原力†.
Pub Date : 2019-09-01 DOI: 10.1109/ALLERTON.2019.8919698
Xuan Wang, S. Mou, S. Sundaram
Consensus-based distributed algorithms have been the key to many problems arising in multi-agent systems including reinforcement learning [1], [2], formation control [3], [4], task allocation [5]and so on. Byconsensushere is meant that all agents in the network reach an agreement regarding a certain quantity of interest [6], [7]. Bydistributedhere is meant that the whole multi-agent system achieve global objectives by only local coordination among nearby neighbors [8]. On one hand, the absence of central controllers in multi-agent systems make them inherently robust against individual agent/link failures. On the other hand, the high dependence of the whole system on local coordination also raises a significant concern that algorithms for multi-agent networks may be crashed down in the presence of even one malicious agent [9]. This has motivated us to develop methodologies to achieveresiliencein order to guarantee nice performance for consensus-based distributed algorithms especially in hostile environment. One challenge along this direction comes from the fact that each agent is usually with locally available information, which makes it very difficult to identify or isolate malicious agents [10]. The authors of [11]–[13]have achieved significant progress by showing that given $N$adversarial nodes under Byzantine attacks, there exists a strategy for normal agents to achieve consensus if the network connectivity is $2 N+1.$These results are usually computationally expensive, assume the network topology to be all-to-all networks, or require normal agents to be aware of non-local information. Most recently the authors of [14], [15]have investigated consensus-based distributed optimizations under adversarial agents. They have introduced a local filtering mechanism which allows each agent to discard the most extreme values in their neighborhood at each step. This is not directly applicable to consensus-based distributed computation algorithms [16]–[19], in which extreme values may come from the local constraints instead of malicious agents. Thus in this talk we will present a new approach developed in [9], which achieves automated resilience without the identification of malicious agents for consensus-based distributed algorithms based on intersection of convex hulls [20].
基于共识的分布式算法是解决多代理系统中出现的许多问题的关键,包括强化学习 [1]、[2]、编队控制 [3]、[4]、任务分配 [5] 等。这里所说的共识是指网络中的所有代理就某一感兴趣的数量达成一致[6]、[7]。分布式(distributed)是指整个多代理系统只通过附近邻居之间的局部协调来实现全局目标[8]。一方面,多代理系统中没有中央控制器,使其本身具有抵御单个代理/链路故障的鲁棒性。另一方面,整个系统对局部协调的高度依赖也引发了一个重大隐忧,那就是哪怕只有一个恶意代理,多代理网络的算法也可能会崩溃[9]。这就促使我们开发实现弹性的方法,以保证基于共识的分布式算法的良好性能,尤其是在敌对环境中。这个方向上的一个挑战来自于这样一个事实,即每个代理通常都拥有本地可用信息,这使得识别或隔离恶意代理变得非常困难[10]。文献[11]-[13]的作者已经取得了重大进展,他们证明了在拜占庭攻击下,给定 $N$ 的敌对节点,如果网络连通性为 2 N+1$,则存在一种正常代理达成共识的策略。最近,[14]和[15]的作者研究了对抗代理下基于共识的分布式优化。他们引入了一种本地过滤机制,允许每个代理在每一步都舍弃其邻域中最极端的值。这并不直接适用于基于共识的分布式计算算法[16]-[19],在这种算法中,极端值可能来自局部约束而非恶意代理。因此,在本讲座中,我们将介绍[9]中开发的一种新方法,该方法无需识别恶意代理,即可自动实现基于共识的分布式计算算法的弹性,该算法基于凸壳相交[20]。
{"title":"Resilience for Consensus-based Distributed Algorithms in Hostile Environment†","authors":"Xuan Wang, S. Mou, S. Sundaram","doi":"10.1109/ALLERTON.2019.8919698","DOIUrl":"https://doi.org/10.1109/ALLERTON.2019.8919698","url":null,"abstract":"Consensus-based distributed algorithms have been the key to many problems arising in multi-agent systems including reinforcement learning [1], [2], formation control [3], [4], task allocation [5]and so on. Byconsensushere is meant that all agents in the network reach an agreement regarding a certain quantity of interest [6], [7]. Bydistributedhere is meant that the whole multi-agent system achieve global objectives by only local coordination among nearby neighbors [8]. On one hand, the absence of central controllers in multi-agent systems make them inherently robust against individual agent/link failures. On the other hand, the high dependence of the whole system on local coordination also raises a significant concern that algorithms for multi-agent networks may be crashed down in the presence of even one malicious agent [9]. This has motivated us to develop methodologies to achieveresiliencein order to guarantee nice performance for consensus-based distributed algorithms especially in hostile environment. One challenge along this direction comes from the fact that each agent is usually with locally available information, which makes it very difficult to identify or isolate malicious agents [10]. The authors of [11]–[13]have achieved significant progress by showing that given $N$adversarial nodes under Byzantine attacks, there exists a strategy for normal agents to achieve consensus if the network connectivity is $2 N+1.$These results are usually computationally expensive, assume the network topology to be all-to-all networks, or require normal agents to be aware of non-local information. Most recently the authors of [14], [15]have investigated consensus-based distributed optimizations under adversarial agents. They have introduced a local filtering mechanism which allows each agent to discard the most extreme values in their neighborhood at each step. This is not directly applicable to consensus-based distributed computation algorithms [16]–[19], in which extreme values may come from the local constraints instead of malicious agents. Thus in this talk we will present a new approach developed in [9], which achieves automated resilience without the identification of malicious agents for consensus-based distributed algorithms based on intersection of convex hulls [20].","PeriodicalId":120479,"journal":{"name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127446269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear Two-Time-Scale Stochastic Approximation A Finite-Time Analysis 线性双时间尺度随机近似的有限时间分析
Pub Date : 2019-09-01 DOI: 10.1109/ALLERTON.2019.8919880
T. Doan, J. Romberg
We consider two-time-scale stochastic approximation for finding the solution of a linear system of two equations. Such methods have found broad applications in many areas, especially in machine learning and reinforcement learning. A critical question in this area is to analyze the convergence rates (or sample complexity) of this method, which has not been fully addressed in the existing literature. Our contribution in this paper is, therefore, to provide a new analysis for the finite-time performance of the two-time-scale stochastic approximation. Our key idea is to leverage the common techniques from optimization, in particular, we utilize a residual function to capture the coupling between the two iterates. This will allow us to explicit design the two step sizes used by the two iterations as well as to provide a finite-time error bound on the convergence of the two iterates. Our analysis in this paper provides another aspect to the existing techniques in the literature of two-time-scale stochastic approximation, which we believe is more elegant and can be more applicable to many scenarios.
我们考虑用双时间尺度随机逼近来求两个方程线性系统的解。这些方法在许多领域都有广泛的应用,特别是在机器学习和强化学习方面。该领域的一个关键问题是分析该方法的收敛率(或样本复杂度),这在现有文献中尚未得到充分解决。因此,我们在本文中的贡献是为双时间尺度随机近似的有限时间性能提供了一种新的分析。我们的关键思想是利用优化中的常用技术,特别是,我们利用残差函数来捕获两个迭代之间的耦合。这将允许我们显式地设计两个迭代所使用的两个步长,并提供两个迭代收敛的有限时间误差界。本文的分析为现有文献中的双时间尺度随机逼近技术提供了另一个方面,我们认为双时间尺度随机逼近技术更优雅,更适用于许多场景。
{"title":"Linear Two-Time-Scale Stochastic Approximation A Finite-Time Analysis","authors":"T. Doan, J. Romberg","doi":"10.1109/ALLERTON.2019.8919880","DOIUrl":"https://doi.org/10.1109/ALLERTON.2019.8919880","url":null,"abstract":"We consider two-time-scale stochastic approximation for finding the solution of a linear system of two equations. Such methods have found broad applications in many areas, especially in machine learning and reinforcement learning. A critical question in this area is to analyze the convergence rates (or sample complexity) of this method, which has not been fully addressed in the existing literature. Our contribution in this paper is, therefore, to provide a new analysis for the finite-time performance of the two-time-scale stochastic approximation. Our key idea is to leverage the common techniques from optimization, in particular, we utilize a residual function to capture the coupling between the two iterates. This will allow us to explicit design the two step sizes used by the two iterations as well as to provide a finite-time error bound on the convergence of the two iterates. Our analysis in this paper provides another aspect to the existing techniques in the literature of two-time-scale stochastic approximation, which we believe is more elegant and can be more applicable to many scenarios.","PeriodicalId":120479,"journal":{"name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121186517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Learning to Communicate with Limited Co-design 学会与有限的共同设计沟通
Pub Date : 2019-09-01 DOI: 10.1109/ALLERTON.2019.8919749
A. Sahai, J. Sanz, Vignesh Subramanian, Caryn Tran, Kailas Vodrahalli
In this work we examine the problem of learning to cooperate in the context of wireless communication. We consider the two agent setting where agents must learn modulation and demodulation schemes that enable them to communicate with each other in the presence of a power-constrained additive white Gaussian noise (AWGN) channel. We investigate whether learning is possible under different levels of information sharing between distributed agents that are not necessarily co-designed. We make use of the “Echo” protocol, a learning protocol where an agent hears, understands, and repeats (echoes) back the message received from another agent. Each agent uses what it sends and receives to train itself to communicate. To capture the idea of cooperation between agents that are “not necessarily co-designed,” we use two different populations of function approximators – neural networks and polynomials. In addition to diverse learning agents, we include non-learning agents that use fixed standardized modulation protocols such as QPSK and 16QAM. This is used to verify that the Echo approach to learning to communicate works independent of the inner workings of the agents, and that learning agents can not only learn to match the communication expectations of others, but can also collaboratively invent a successful communication approach from independent random initializations. In addition to simulation-based experiments, we implement the Echo protocol in physical software-defined radio experiments to verify that it can work with real radios. To explore the continuum between tight co-design of learning agents and independently designed agents, we study how learning is impacted by different levels of information sharing – including sharing training symbols, sharing intermediate loss information, and sharing full gradient information. The resulting learning techniques span supervised learning and reinforcement learning. We find that in general, co-design (increased information sharing) accelerates learning and that this effect becomes more pronounced as the communication task becomes harder.
在这项工作中,我们研究了在无线通信环境下学习合作的问题。我们考虑了两个智能体设置,其中智能体必须学习调制和解调方案,使它们能够在功率受限的加性高斯白噪声(AWGN)信道中相互通信。我们研究了在不一定是共同设计的分布式代理之间的不同级别的信息共享下,学习是否可能。我们使用了“Echo”协议,这是一种学习协议,其中一个代理听到、理解并重复(Echo)从另一个代理接收到的消息。每个代理使用它发送和接收的信息来训练自己进行通信。为了捕捉“不一定是共同设计”的代理之间的合作的概念,我们使用了两种不同的函数逼近器——神经网络和多项式。除了不同的学习代理,我们还包括使用固定的标准化调制协议(如QPSK和16QAM)的非学习代理。这被用来验证Echo学习通信的方法独立于代理的内部工作,并且学习代理不仅可以学习匹配他人的通信期望,而且可以从独立的随机初始化中协同发明成功的通信方法。除了基于仿真的实验外,我们还在物理软件定义无线电实验中实现了Echo协议,以验证它可以与真实无线电一起工作。为了探索学习智能体的紧密协同设计和独立设计智能体之间的连续性,我们研究了不同级别的信息共享(包括共享训练符号、共享中间损失信息和共享全梯度信息)对学习的影响。由此产生的学习技术包括监督学习和强化学习。我们发现,一般来说,协同设计(增加信息共享)会加速学习,而且随着交流任务变得更加困难,这种效果会变得更加明显。
{"title":"Learning to Communicate with Limited Co-design","authors":"A. Sahai, J. Sanz, Vignesh Subramanian, Caryn Tran, Kailas Vodrahalli","doi":"10.1109/ALLERTON.2019.8919749","DOIUrl":"https://doi.org/10.1109/ALLERTON.2019.8919749","url":null,"abstract":"In this work we examine the problem of learning to cooperate in the context of wireless communication. We consider the two agent setting where agents must learn modulation and demodulation schemes that enable them to communicate with each other in the presence of a power-constrained additive white Gaussian noise (AWGN) channel. We investigate whether learning is possible under different levels of information sharing between distributed agents that are not necessarily co-designed. We make use of the “Echo” protocol, a learning protocol where an agent hears, understands, and repeats (echoes) back the message received from another agent. Each agent uses what it sends and receives to train itself to communicate. To capture the idea of cooperation between agents that are “not necessarily co-designed,” we use two different populations of function approximators – neural networks and polynomials. In addition to diverse learning agents, we include non-learning agents that use fixed standardized modulation protocols such as QPSK and 16QAM. This is used to verify that the Echo approach to learning to communicate works independent of the inner workings of the agents, and that learning agents can not only learn to match the communication expectations of others, but can also collaboratively invent a successful communication approach from independent random initializations. In addition to simulation-based experiments, we implement the Echo protocol in physical software-defined radio experiments to verify that it can work with real radios. To explore the continuum between tight co-design of learning agents and independently designed agents, we study how learning is impacted by different levels of information sharing – including sharing training symbols, sharing intermediate loss information, and sharing full gradient information. The resulting learning techniques span supervised learning and reinforcement learning. We find that in general, co-design (increased information sharing) accelerates learning and that this effect becomes more pronounced as the communication task becomes harder.","PeriodicalId":120479,"journal":{"name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Threshold-Secure Coding with Shared Key 阈值安全编码与共享密钥
Pub Date : 2019-09-01 DOI: 10.1109/ALLERTON.2019.8919868
Nasser Aldaghri, Hessam Mahdavifar
Cryptographic protocols are often implemented at upper layers of communication networks, while error-correcting codes are employed at the physical layer. In this paper, we consider utilizing readily-available physical layer functions, such as encoders and decoders, together with shared keys to provide a threshold-type security scheme. To this end, the effect of physical layer communication is abstracted out and the channels between the legitimate parties, Alice and Bob, and the eaves-dropper Eve are assumed to be noiseless. We introduce a model for threshold-secure coding, where Alice and Bob communicate using a shared key in such a way that Eve does not get any information, in an information-theoretic sense, about the key as well as about any subset of the input symbols of size up to a certain threshold. Then, a framework is provided for constructing threshold-secure codes form linear block codes while characterizing the requirements to satisfy the reliability and security conditions. Moreover, we propose a threshold-secure coding scheme, based on Reed-Muller (RM) codes, that meets security and reliability conditions. Furthermore, it is shown that the encoder and the decoder of the scheme can be implemented efficiently with quasi-linear time complexity. In particular, a low-complexity successive cancellation decoder is shown for the RM-based scheme. Also, the scheme is flexible and can be adapted given any key length.
加密协议通常在通信网络的上层实现,而纠错码则在物理层使用。在本文中,我们考虑利用易于获得的物理层功能,如编码器和解码器,以及共享密钥来提供阈值类型的安全方案。为此,抽象出物理层通信的影响,并假设合法双方Alice和Bob以及窃听者Eve之间的信道是无噪声的。我们引入了一个阈值安全编码模型,其中Alice和Bob使用共享密钥进行通信,在信息论意义上,Eve不会获得关于密钥以及大小达到某个阈值的输入符号子集的任何信息。然后,给出了一个由线性分组码构造阈值安全码的框架,同时描述了满足可靠性和安全性条件的要求。此外,我们还提出了一种阈值安全编码方案,该方案基于Reed-Muller (RM)码,满足安全性和可靠性条件。此外,该方案的编码器和解码器可以在准线性时间复杂度下有效地实现。特别地,给出了一种低复杂度的连续对消解码器。此外,该方案是灵活的,可以适应任何密钥长度。
{"title":"Threshold-Secure Coding with Shared Key","authors":"Nasser Aldaghri, Hessam Mahdavifar","doi":"10.1109/ALLERTON.2019.8919868","DOIUrl":"https://doi.org/10.1109/ALLERTON.2019.8919868","url":null,"abstract":"Cryptographic protocols are often implemented at upper layers of communication networks, while error-correcting codes are employed at the physical layer. In this paper, we consider utilizing readily-available physical layer functions, such as encoders and decoders, together with shared keys to provide a threshold-type security scheme. To this end, the effect of physical layer communication is abstracted out and the channels between the legitimate parties, Alice and Bob, and the eaves-dropper Eve are assumed to be noiseless. We introduce a model for threshold-secure coding, where Alice and Bob communicate using a shared key in such a way that Eve does not get any information, in an information-theoretic sense, about the key as well as about any subset of the input symbols of size up to a certain threshold. Then, a framework is provided for constructing threshold-secure codes form linear block codes while characterizing the requirements to satisfy the reliability and security conditions. Moreover, we propose a threshold-secure coding scheme, based on Reed-Muller (RM) codes, that meets security and reliability conditions. Furthermore, it is shown that the encoder and the decoder of the scheme can be implemented efficiently with quasi-linear time complexity. In particular, a low-complexity successive cancellation decoder is shown for the RM-based scheme. Also, the scheme is flexible and can be adapted given any key length.","PeriodicalId":120479,"journal":{"name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"400 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126672137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blink: A Fully Automated Unsupervised Algorithm for Eye-Blink Detection in EEG Signals 眨眼:脑电信号中眨眼检测的全自动无监督算法
Pub Date : 2019-09-01 DOI: 10.1109/ALLERTON.2019.8919795
Mohit Agarwal, Raghupathy Sivakumar
Eye-blinks are known to substantially contaminate EEG signals, and thereby severely impact the decoding of EEG signals in various medical and scientific applications. In this work, we consider the problem of eye-blink detection that can then be employed to reliably remove eye-blinks from EEG signals. We propose a fully automated and unsupervised eyeblink detection algorithm, Blink that self-learns user-specific brainwave profiles for eye-blinks. Hence, Blink does away with any user training or manual inspection requirements. Blink functions on a single channel EEG, and is capable of estimating the start and end timestamps of eye-blinks in a precise manner. We collect four different eye-blink datasets and annotate 2300+ eye-blinks to evaluate the robustness performance of Blink across headsets (OpenBCI and Muse), eye-blink types (voluntary and involuntary), and various user activities (watching a video, reading an article, and attending to an external stimulation). The Blink algorithm performs consistently with an accuracy of over 98% for all the tasks with an average precision of 0.934. The source code and annotated datasets are released publicly for reproducibility and further research. To the best of our knowledge, this is the first ever annotated eye-blink EEG dataset released in the public domain.
众所周知,眨眼会严重污染脑电图信号,从而严重影响各种医疗和科学应用中脑电图信号的解码。在这项工作中,我们考虑了眨眼检测问题,然后可以用来可靠地从脑电图信号中去除眨眼。我们提出了一种完全自动化和无监督的眨眼检测算法,Blink,它可以自我学习用户特定的眨眼脑波特征。因此,Blink不需要任何用户培训或人工检查要求。眨眼在单通道脑电图上工作,能够精确地估计眨眼的开始和结束时间戳。我们收集了四种不同的眨眼数据集,并注释了2300多次眨眼,以评估Blink在不同耳机(OpenBCI和Muse)、眨眼类型(自愿和非自愿)和各种用户活动(观看视频、阅读文章和参加外部刺激)上的鲁棒性表现。Blink算法对所有任务的准确率均在98%以上,平均精度为0.934。源代码和带注释的数据集公开发布,以供再现性和进一步研究。据我们所知,这是有史以来第一个在公共领域发布的带注释的眨眼脑电图数据集。
{"title":"Blink: A Fully Automated Unsupervised Algorithm for Eye-Blink Detection in EEG Signals","authors":"Mohit Agarwal, Raghupathy Sivakumar","doi":"10.1109/ALLERTON.2019.8919795","DOIUrl":"https://doi.org/10.1109/ALLERTON.2019.8919795","url":null,"abstract":"Eye-blinks are known to substantially contaminate EEG signals, and thereby severely impact the decoding of EEG signals in various medical and scientific applications. In this work, we consider the problem of eye-blink detection that can then be employed to reliably remove eye-blinks from EEG signals. We propose a fully automated and unsupervised eyeblink detection algorithm, Blink that self-learns user-specific brainwave profiles for eye-blinks. Hence, Blink does away with any user training or manual inspection requirements. Blink functions on a single channel EEG, and is capable of estimating the start and end timestamps of eye-blinks in a precise manner. We collect four different eye-blink datasets and annotate 2300+ eye-blinks to evaluate the robustness performance of Blink across headsets (OpenBCI and Muse), eye-blink types (voluntary and involuntary), and various user activities (watching a video, reading an article, and attending to an external stimulation). The Blink algorithm performs consistently with an accuracy of over 98% for all the tasks with an average precision of 0.934. The source code and annotated datasets are released publicly for reproducibility and further research. To the best of our knowledge, this is the first ever annotated eye-blink EEG dataset released in the public domain.","PeriodicalId":120479,"journal":{"name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130603546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Distributed Asynchronous Random Projection Algorithm (DARPA) with Arbitrary Uniformly Bounded Delay 具有任意均匀有界延迟的分布式异步随机投影算法
Pub Date : 2019-09-01 DOI: 10.1109/ALLERTON.2019.8919755
Elie Atallah, N. Rahnavard, Chinwendu Enyioha
In this paper, an asynchronous random projection algorithm is introduced to solve a distributed constrained convex optimization problem over a time-varying multi-agent network. In this asynchronous case, each agent computes its estimate by exchanging information with its neighbors within a bounded delay lapse. For diminishing uncoordinated stepsizes and some standard conditions on the gradient errors, we provide a convergence analysis of Distributed Asynchronous Random Projection Algorithm (DARPA) to the same optimal point under an arbitrary uniformly bounded delay.
针对时变多智能体网络中的分布式约束凸优化问题,提出了一种异步随机投影算法。在这种异步情况下,每个代理通过在有限的延迟延时内与其邻居交换信息来计算其估计。为了减少非协调步长和梯度误差的一些标准条件,我们给出了在任意均匀有界延迟下分布式异步随机投影算法(Distributed Asynchronous Random Projection Algorithm, DARPA)收敛到同一最优点的分析。
{"title":"Distributed Asynchronous Random Projection Algorithm (DARPA) with Arbitrary Uniformly Bounded Delay","authors":"Elie Atallah, N. Rahnavard, Chinwendu Enyioha","doi":"10.1109/ALLERTON.2019.8919755","DOIUrl":"https://doi.org/10.1109/ALLERTON.2019.8919755","url":null,"abstract":"In this paper, an asynchronous random projection algorithm is introduced to solve a distributed constrained convex optimization problem over a time-varying multi-agent network. In this asynchronous case, each agent computes its estimate by exchanging information with its neighbors within a bounded delay lapse. For diminishing uncoordinated stepsizes and some standard conditions on the gradient errors, we provide a convergence analysis of Distributed Asynchronous Random Projection Algorithm (DARPA) to the same optimal point under an arbitrary uniformly bounded delay.","PeriodicalId":120479,"journal":{"name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125910682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning the Unobservable: High-Resolution State Estimation via Deep Learning 学习不可观察:通过深度学习的高分辨率状态估计
Pub Date : 2019-09-01 DOI: 10.1109/ALLERTON.2019.8919782
Kursat Rasim Mestav, L. Tong
The problem of achieving the fast-timescale state estimation for a power system with limited deployment of phasor measurement units is considered. A deep neural-network architecture that integrates bad-data detection, data cleansing, and the minimum mean squared error state estimation is developed. It includes a universal bad-data detection and a Bayesian state estimation subnetworks. A novel universal bad-data detection technique is proposed that requires no knowledge about data distributions under regular and irregular operating conditions. The subnetwork for universal bad-data detection consists of an inverse generative model and a coincidence test. It is implemented through the training of a generative adversary network and an auto-encoder using slow-timescale historical data. The Bayesian state estimation subnetwork is trained through a generative adversary network with embedded physical models of the power system. Comparing with the conventional weighted least squares approach to state estimation, the proposed minimum mean-squared error state estimator does not require observability. Simulations demonstrate orders of magnitude improvement in estimation accuracy and online computation costs of/ver the state-of-the-art solutions.
研究了具有有限相量测量单元的电力系统的快速时间尺度状态估计问题。开发了一种集成了坏数据检测、数据清理和最小均方误差状态估计的深度神经网络体系结构。它包括一个通用的坏数据检测和一个贝叶斯状态估计子网。提出了一种新的通用坏数据检测技术,该技术不需要了解规则和不规则工况下的数据分布情况。通用坏数据检测子网由逆生成模型和符合性检验组成。它是通过训练生成对手网络和使用慢时间尺度历史数据的自编码器来实现的。贝叶斯状态估计子网络通过嵌入电力系统物理模型的生成对抗网络进行训练。与传统的加权最小二乘状态估计方法相比,所提出的最小均方误差状态估计器不需要可观测性。仿真表明,与最先进的解决方案相比,估计精度和在线计算成本有了数量级的提高。
{"title":"Learning the Unobservable: High-Resolution State Estimation via Deep Learning","authors":"Kursat Rasim Mestav, L. Tong","doi":"10.1109/ALLERTON.2019.8919782","DOIUrl":"https://doi.org/10.1109/ALLERTON.2019.8919782","url":null,"abstract":"The problem of achieving the fast-timescale state estimation for a power system with limited deployment of phasor measurement units is considered. A deep neural-network architecture that integrates bad-data detection, data cleansing, and the minimum mean squared error state estimation is developed. It includes a universal bad-data detection and a Bayesian state estimation subnetworks. A novel universal bad-data detection technique is proposed that requires no knowledge about data distributions under regular and irregular operating conditions. The subnetwork for universal bad-data detection consists of an inverse generative model and a coincidence test. It is implemented through the training of a generative adversary network and an auto-encoder using slow-timescale historical data. The Bayesian state estimation subnetwork is trained through a generative adversary network with embedded physical models of the power system. Comparing with the conventional weighted least squares approach to state estimation, the proposed minimum mean-squared error state estimator does not require observability. Simulations demonstrate orders of magnitude improvement in estimation accuracy and online computation costs of/ver the state-of-the-art solutions.","PeriodicalId":120479,"journal":{"name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123964812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Scalable String Reconciliation by Recursive Content-Dependent Shingling 基于递归内容依赖的Shingling的可伸缩字符串协调
Pub Date : 2019-09-01 DOI: 10.1109/ALLERTON.2019.8919901
B. Song, A. Trachtenberg
We consider the problem of reconciling similar, but remote, strings with minimum communication complexity. This “string reconciliation” problem is a fundamental building block for a variety of networking applications, including those that maintain large-scale distributed networks and perform remote file synchronization. We present the novel Recursive Content-Dependent Shingling (RCDS) protocol that is computationally practical for large strings and scales linearly with the edit distance between the remote strings. We provide comparisons to the performance of rsync, one of the most popular file synchronization tools in active use. Our experiments show that, with minimal engineering, RCDS outperforms the heavily optimized rsync in reconciling release revisions for about 51% of the 5000 top starred git repositories on GitHub. The improvement is particularly evident for repositories that see frequent, but small, updates.
我们考虑以最小的通信复杂性协调相似但远程的字符串的问题。这种“字符串协调”问题是各种网络应用程序的基本构建块,包括那些维护大规模分布式网络和执行远程文件同步的应用程序。我们提出了一种新的递归内容相关Shingling (RCDS)协议,该协议在计算上适用于大字符串,并随远程字符串之间的编辑距离线性扩展。我们比较了rsync的性能,rsync是最流行的文件同步工具之一。我们的实验表明,通过最少的工程,RCDS在协调GitHub上5000个顶级git存储库中约51%的版本修订方面优于经过大量优化的rsync。对于经常看到小更新的存储库,这种改进尤其明显。
{"title":"Scalable String Reconciliation by Recursive Content-Dependent Shingling","authors":"B. Song, A. Trachtenberg","doi":"10.1109/ALLERTON.2019.8919901","DOIUrl":"https://doi.org/10.1109/ALLERTON.2019.8919901","url":null,"abstract":"We consider the problem of reconciling similar, but remote, strings with minimum communication complexity. This “string reconciliation” problem is a fundamental building block for a variety of networking applications, including those that maintain large-scale distributed networks and perform remote file synchronization. We present the novel Recursive Content-Dependent Shingling (RCDS) protocol that is computationally practical for large strings and scales linearly with the edit distance between the remote strings. We provide comparisons to the performance of rsync, one of the most popular file synchronization tools in active use. Our experiments show that, with minimal engineering, RCDS outperforms the heavily optimized rsync in reconciling release revisions for about 51% of the 5000 top starred git repositories on GitHub. The improvement is particularly evident for repositories that see frequent, but small, updates.","PeriodicalId":120479,"journal":{"name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117129531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convex Optimization for Shallow Neural Networks 浅神经网络的凸优化
Pub Date : 2019-09-01 DOI: 10.1109/ALLERTON.2019.8919769
Tolga Ergen, Mert Pilanci
We consider non-convex training of shallow neural networks and introduce a convex relaxation approach with theoretical guarantees. For the single neuron case, we prove that the relaxation preserves the location of the global minimum under a planted model assumption. Therefore, a globally optimal solution can be efficiently found via a gradient method. We show that gradient descent applied on the relaxation always outperforms gradient descent on the original non-convex loss with no additional computational cost. We then characterize this relaxation as a regularizer and further introduce extensions to multineuron single hidden layer networks.
我们考虑浅神经网络的非凸训练,并引入一种具有理论保证的凸松弛方法。对于单神经元情况,我们证明了在种植模型假设下松弛保留了全局最小值的位置。因此,利用梯度法可以有效地求出全局最优解。我们证明,在没有额外计算成本的情况下,应用于松弛的梯度下降总是优于应用于原始非凸损失的梯度下降。然后,我们将这种松弛描述为正则化器,并进一步引入扩展到多神经元单隐藏层网络。
{"title":"Convex Optimization for Shallow Neural Networks","authors":"Tolga Ergen, Mert Pilanci","doi":"10.1109/ALLERTON.2019.8919769","DOIUrl":"https://doi.org/10.1109/ALLERTON.2019.8919769","url":null,"abstract":"We consider non-convex training of shallow neural networks and introduce a convex relaxation approach with theoretical guarantees. For the single neuron case, we prove that the relaxation preserves the location of the global minimum under a planted model assumption. Therefore, a globally optimal solution can be efficiently found via a gradient method. We show that gradient descent applied on the relaxation always outperforms gradient descent on the original non-convex loss with no additional computational cost. We then characterize this relaxation as a regularizer and further introduce extensions to multineuron single hidden layer networks.","PeriodicalId":120479,"journal":{"name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121494842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Efficient Coded Caching with Limited Memory 有限内存下的高效编码缓存
Pub Date : 2019-09-01 DOI: 10.1109/ALLERTON.2019.8919726
Yousef AlHassoun, Faisal Alotaibi, A. E. Gamal, H. E. Gamal
Recently, coded caching techniques have received tremendous attention due to its significant gain in reducing the cost of delivery rate. However, this gain was only considered with the assumption of free placement phase. Motivated by our recent result of coded caching, we focus here on minimizing the overall rate of the caching network by capturing the transmission cost of the placement and delivery phases under limited storage memory at the end user. We model the dynamic nature of the network through a cost structure that allows for varying the network architecture and cost per transmission across the two phases of caching. The optimal caching decision for the worst case scenario with memory constraint is provided. Moreover, analysis of the delivery phase is proposed where trade-offs between system parameters, memory, and delivery rate are considered. Interestingly, we show that there are regions where the uncoded caching scheme outperforms the coded caching scheme. Finally, we provide numerical results to support and demonstrate our findings.
最近,由于编码缓存技术在降低交付成本方面的显著优势,它受到了极大的关注。然而,这种增益只是在自由放置阶段的假设下考虑的。受最近编码缓存结果的启发,我们在这里关注的是在终端用户有限的存储内存下,通过捕获放置和交付阶段的传输成本来最小化缓存网络的总体速率。我们通过一个成本结构对网络的动态特性进行建模,该结构允许在缓存的两个阶段中改变网络架构和每次传输的成本。给出了具有内存约束的最坏情况下的最佳缓存决策。此外,提出了交付阶段的分析,其中考虑了系统参数、内存和交付率之间的权衡。有趣的是,我们展示了在某些区域,未编码缓存方案优于编码缓存方案。最后,我们提供了数值结果来支持和证明我们的发现。
{"title":"Efficient Coded Caching with Limited Memory","authors":"Yousef AlHassoun, Faisal Alotaibi, A. E. Gamal, H. E. Gamal","doi":"10.1109/ALLERTON.2019.8919726","DOIUrl":"https://doi.org/10.1109/ALLERTON.2019.8919726","url":null,"abstract":"Recently, coded caching techniques have received tremendous attention due to its significant gain in reducing the cost of delivery rate. However, this gain was only considered with the assumption of free placement phase. Motivated by our recent result of coded caching, we focus here on minimizing the overall rate of the caching network by capturing the transmission cost of the placement and delivery phases under limited storage memory at the end user. We model the dynamic nature of the network through a cost structure that allows for varying the network architecture and cost per transmission across the two phases of caching. The optimal caching decision for the worst case scenario with memory constraint is provided. Moreover, analysis of the delivery phase is proposed where trade-offs between system parameters, memory, and delivery rate are considered. Interestingly, we show that there are regions where the uncoded caching scheme outperforms the coded caching scheme. Finally, we provide numerical results to support and demonstrate our findings.","PeriodicalId":120479,"journal":{"name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121032831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1