首页 > 最新文献

Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems最新文献

英文 中文
Why Some Like It Loud: Timing Power Attacks in Multi-tenant Data Centers Using an Acoustic Side Channel 为什么有些人喜欢大声:在多租户数据中心使用声学侧信道定时电源攻击
M. A. Islam, Luting Yang, K. Ranganath, Shaolei Ren
The common practice of power infrastructure oversubscription in data centers exposes dangerous vulnerabilities to well-timed power attacks (i.e., maliciously timed power loads), possibly creating outages and resulting in multimillion-dollar losses. In this paper, we focus on the emerging threat of power attacks in a multi-tenant data center, where a malicious tenant (i.e., attacker) aims at compromising the data center availability by launching power attacks and overloading the power capacity. We discover a novel acoustic side channel resulting from servers' cooling fan noise, which can help the attacker time power attacks at the moments when benign tenants' power usage is high. Concretely, we exploit the acoustic side channel by: (1) employing a high-pass filter to filter out the air conditioner's noise; (2) applying non-negative matrix factorization with sparsity constraint to demix the received aggregate noise and detect periods of high power usage by benign tenants; and (3) designing a state machine to guide power attacks. We run experiments in a practical data center environment as well as simulation studies, and demonstrate that the acoustic side channel can assist the attacker with detecting more than 50% of all attack opportunities, representing state-of-the-art timing accuracy.
数据中心电力基础设施过度订阅的常见做法暴露了危险的漏洞,容易受到及时的电力攻击(即恶意定时的电力负载),可能造成停电并导致数百万美元的损失。在本文中,我们重点关注多租户数据中心中出现的电力攻击威胁,其中恶意租户(即攻击者)旨在通过发起电力攻击和过载电力容量来破坏数据中心的可用性。我们发现了一种由服务器冷却风扇噪声产生的新型声学侧通道,它可以帮助攻击者在良性租户用电量高的时候进行电力攻击。具体而言,我们通过以下方式来开发声学侧通道:(1)采用高通滤波器滤除空调噪声;(2)利用稀疏性约束下的非负矩阵分解对接收到的总噪声进行分解,检测良性租户的高用电量时段;(3)设计状态机引导电力攻击。我们在实际的数据中心环境中进行实验以及仿真研究,并证明声学侧信道可以帮助攻击者检测超过50%的攻击机会,代表了最先进的定时精度。
{"title":"Why Some Like It Loud: Timing Power Attacks in Multi-tenant Data Centers Using an Acoustic Side Channel","authors":"M. A. Islam, Luting Yang, K. Ranganath, Shaolei Ren","doi":"10.1145/3219617.3219645","DOIUrl":"https://doi.org/10.1145/3219617.3219645","url":null,"abstract":"The common practice of power infrastructure oversubscription in data centers exposes dangerous vulnerabilities to well-timed power attacks (i.e., maliciously timed power loads), possibly creating outages and resulting in multimillion-dollar losses. In this paper, we focus on the emerging threat of power attacks in a multi-tenant data center, where a malicious tenant (i.e., attacker) aims at compromising the data center availability by launching power attacks and overloading the power capacity. We discover a novel acoustic side channel resulting from servers' cooling fan noise, which can help the attacker time power attacks at the moments when benign tenants' power usage is high. Concretely, we exploit the acoustic side channel by: (1) employing a high-pass filter to filter out the air conditioner's noise; (2) applying non-negative matrix factorization with sparsity constraint to demix the received aggregate noise and detect periods of high power usage by benign tenants; and (3) designing a state machine to guide power attacks. We run experiments in a practical data center environment as well as simulation studies, and demonstrate that the acoustic side channel can assist the attacker with detecting more than 50% of all attack opportunities, representing state-of-the-art timing accuracy.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124062423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An Optimal Algorithm for Online Non-Convex Learning 一种在线非凸学习的最优算法
L. Yang, Lei Deng, M. Hajiesmaili, Cheng Tan, W. Wong
In many online learning paradigms, convexity plays a central role in the derivation and analysis of online learning algorithms. The results, however, fail to be extended to the non-convex settings, which are necessitated by tons of recent applications. The Online Non-Convex Learning problem generalizes the classic Online Convex Optimization framework by relaxing the convexity assumption on the cost function (to a Lipschitz continuous function) and the decision set. The state-of-the-art result for ønco demonstrates that the classic Hedge algorithm attains a sublinear regret of O(√T log T). The regret lower bound for øco, however, is Omega(√T), and to the best of our knowledge, there is no result in the context of the ønco problem achieving the same bound. This paper proposes the Online Recursive Weighting algorithm with regret of O(√T), matching the tight regret lower bound for the øco problem, and fills the regret gap between the state-of-the-art results in the online convex and non-convex optimization problems.
在许多在线学习范式中,凸性在在线学习算法的推导和分析中起着核心作用。然而,结果不能扩展到非凸设置,这是最近大量应用所必需的。在线非凸学习问题将经典的在线凸优化框架进行了推广,放宽了代价函数(为Lipschitz连续函数)和决策集的凸性假设。对于ønco的最新结果表明,经典的Hedge算法获得了O(√T log T)的次线性遗憾。然而,øco的遗憾下界是Omega(√T),据我们所知,在ønco问题的上下文中没有结果达到相同的边界。本文提出了后悔度为O(√T)的在线递归加权算法,匹配了øco问题的严格后悔下界,填补了在线凸优化问题和非凸优化问题的最新结果之间的遗憾差距。
{"title":"An Optimal Algorithm for Online Non-Convex Learning","authors":"L. Yang, Lei Deng, M. Hajiesmaili, Cheng Tan, W. Wong","doi":"10.1145/3219617.3219635","DOIUrl":"https://doi.org/10.1145/3219617.3219635","url":null,"abstract":"In many online learning paradigms, convexity plays a central role in the derivation and analysis of online learning algorithms. The results, however, fail to be extended to the non-convex settings, which are necessitated by tons of recent applications. The Online Non-Convex Learning problem generalizes the classic Online Convex Optimization framework by relaxing the convexity assumption on the cost function (to a Lipschitz continuous function) and the decision set. The state-of-the-art result for ønco demonstrates that the classic Hedge algorithm attains a sublinear regret of O(√T log T). The regret lower bound for øco, however, is Omega(√T), and to the best of our knowledge, there is no result in the context of the ønco problem achieving the same bound. This paper proposes the Online Recursive Weighting algorithm with regret of O(√T), matching the tight regret lower bound for the øco problem, and fills the regret gap between the state-of-the-art results in the online convex and non-convex optimization problems.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131121629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Bootstrapped Graph Diffusions: Exposing the Power of Nonlinearity 自举图扩散:揭示非线性的力量
Eliav Buchnik, E. Cohen
Graph-based semi-supervised learning (SSL) algorithms predict labels for all nodes based on provided labels of a small set of seed nodes. Classic methods capture the graph structure through some underlying diffusion process that propagates through the graph edges. Spectral diffusion, which includes personalized page rank and label propagation, propagates through random walks. Social diffusion propagates through shortest paths. These diffusions are linear in the sense of not distinguishing between contributions of few "strong" relations or many "weak'' relations. Recent methods such as node embeddings and graph convolutional networks (GCN) attained significant gains in quality for SSL tasks. These methods vary on how the graph structure, seed label information, and other features are used, but do share a common thread of nonlinearity that suppresses weak relations and re-enforces stronger ones. Aiming for quality gain with more scalable methods, we revisit classic linear diffusion methods and place them in a self-training framework. The resulting bootstrapped diffusions are nonlinear in that they re-enforce stronger relations, as with the more complex methods. Surprisingly, we observe that SSL with bootstrapped diffusions not only significantly improves over the respective non-bootstrapped baselines but also outperform state-of-the-art SSL methods. Moreover, since the self-training wrapper retains the scalability of the base method, we obtain both higher quality and better scalability.
基于图的半监督学习(SSL)算法根据提供的一小部分种子节点的标签来预测所有节点的标签。经典的方法是通过一些底层的扩散过程来捕获图的结构,这个扩散过程在图的边缘上传播。频谱扩散,其中包括个性化页面排名和标签传播,通过随机行走传播。社会扩散通过最短路径传播。在不区分少数“强”关系或许多“弱”关系的贡献的意义上,这些扩散是线性的。最近的方法,如节点嵌入和图卷积网络(GCN)在SSL任务的质量上取得了显著的进步。这些方法因图结构、种子标签信息和其他特征的使用方式而异,但它们都有一个共同的非线性线索,即抑制弱关系并强化强关系。为了用更可扩展的方法获得质量,我们重新审视了经典的线性扩散方法,并将它们置于自我训练框架中。由此产生的自举扩散是非线性的,因为它们加强了更强的关系,就像更复杂的方法一样。令人惊讶的是,我们观察到具有自引导扩散的SSL不仅比各自的非自引导基线显著提高,而且优于最先进的SSL方法。此外,由于自训练包装器保留了基方法的可扩展性,我们获得了更高的质量和更好的可扩展性。
{"title":"Bootstrapped Graph Diffusions: Exposing the Power of Nonlinearity","authors":"Eliav Buchnik, E. Cohen","doi":"10.1145/3219617.3219621","DOIUrl":"https://doi.org/10.1145/3219617.3219621","url":null,"abstract":"Graph-based semi-supervised learning (SSL) algorithms predict labels for all nodes based on provided labels of a small set of seed nodes. Classic methods capture the graph structure through some underlying diffusion process that propagates through the graph edges. Spectral diffusion, which includes personalized page rank and label propagation, propagates through random walks. Social diffusion propagates through shortest paths. These diffusions are linear in the sense of not distinguishing between contributions of few \"strong\" relations or many \"weak'' relations. Recent methods such as node embeddings and graph convolutional networks (GCN) attained significant gains in quality for SSL tasks. These methods vary on how the graph structure, seed label information, and other features are used, but do share a common thread of nonlinearity that suppresses weak relations and re-enforces stronger ones. Aiming for quality gain with more scalable methods, we revisit classic linear diffusion methods and place them in a self-training framework. The resulting bootstrapped diffusions are nonlinear in that they re-enforce stronger relations, as with the more complex methods. Surprisingly, we observe that SSL with bootstrapped diffusions not only significantly improves over the respective non-bootstrapped baselines but also outperform state-of-the-art SSL methods. Moreover, since the self-training wrapper retains the scalability of the base method, we obtain both higher quality and better scalability.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127837653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Quantitative Evaluation of Contemporary GPU Simulation Methodology 当代GPU仿真方法的定量评价
Akshay Jain, Mahmoud Khairy, Timothy G. Rogers
Contemporary Graphics Processing Units (GPUs) are used to accelerate highly parallel compute workloads. For the last decade, researchers in academia and industry have used cycle-level GPU architecture simulators to evaluate future designs. This paper performs an in-depth analysis of commonly accepted GPU simulation methodology, examining the effect both the workload and the choice of instruction set architecture have on the accuracy of a widely-used simulation infrastructure, GPGPU-Sim. We analyze numerous aspects of the architecture, validating the simulation results against real hardware. Based on a characterized set of over 1700 GPU kernels, we demonstrate that while the relative accuracy of compute-intensive workloads is high, inaccuracies in modeling the memory system result in much higher error when memory performance is critical. We then perform a case study using a recently proposed GPU architecture modification, demonstrating that the cross-product of workload characteristics and instruction set architecture choice can have an affect on the predicted efficacy of the technique.
现代图形处理单元(gpu)用于加速高度并行的计算工作负载。在过去的十年中,学术界和工业界的研究人员已经使用周期级GPU架构模拟器来评估未来的设计。本文对普遍接受的GPU仿真方法进行了深入分析,研究了工作量和指令集架构的选择对广泛使用的仿真基础架构GPGPU-Sim的准确性的影响。我们分析了该体系结构的许多方面,并针对实际硬件验证了仿真结果。基于1700多个GPU内核的特征集,我们证明了虽然计算密集型工作负载的相对准确性很高,但当内存性能至关重要时,内存系统建模的不准确性会导致更高的错误。然后,我们使用最近提出的GPU架构修改进行了案例研究,证明了工作负载特征和指令集架构选择的交叉乘积可以影响该技术的预测效率。
{"title":"A Quantitative Evaluation of Contemporary GPU Simulation Methodology","authors":"Akshay Jain, Mahmoud Khairy, Timothy G. Rogers","doi":"10.1145/3219617.3219658","DOIUrl":"https://doi.org/10.1145/3219617.3219658","url":null,"abstract":"Contemporary Graphics Processing Units (GPUs) are used to accelerate highly parallel compute workloads. For the last decade, researchers in academia and industry have used cycle-level GPU architecture simulators to evaluate future designs. This paper performs an in-depth analysis of commonly accepted GPU simulation methodology, examining the effect both the workload and the choice of instruction set architecture have on the accuracy of a widely-used simulation infrastructure, GPGPU-Sim. We analyze numerous aspects of the architecture, validating the simulation results against real hardware. Based on a characterized set of over 1700 GPU kernels, we demonstrate that while the relative accuracy of compute-intensive workloads is high, inaccuracies in modeling the memory system result in much higher error when memory performance is critical. We then perform a case study using a recently proposed GPU architecture modification, demonstrating that the cross-product of workload characteristics and instruction set architecture choice can have an affect on the predicted efficacy of the technique.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122244451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Neural Network Meets DCN: Traffic-driven Topology Adaptation with Deep Learning 神经网络与DCN:基于深度学习的流量驱动拓扑自适应
Mowei Wang, Yong Cui, Shihan Xiao, Xin Wang, Dan Yang, Kai Chen, Jun Zhu
The emerging optical/wireless topology reconfiguration technologies have shown great potential in improving the performance of data center networks. However, it also poses a big challenge on how to find the best topology configurations to support the dynamic traffic demands. In this work, we present xWeaver, a traffic-driven deep learning solution to infer the high-performance network topology online. xWeaver supports a powerful network model that enables the topology optimization over different performance metrics and network architectures. With the design of properly-structured neural networks, it can automatically derive the critical traffic patterns from data traces and learn the underlying mapping between the traffic patterns and topology configurations specific to the target data center. After offline training, xWeaver generates the optimized (or near-optimal) topology configuration online, and can also smoothly update its model parameters for new traffic patterns. The experiment results show the significant performance gain of xWeaver in supporting smaller flow completion time.
新兴的光/无线拓扑重构技术在提高数据中心网络性能方面显示出巨大的潜力。然而,如何找到支持动态流量需求的最佳拓扑配置也提出了很大的挑战。在这项工作中,我们提出了xWeaver,一个流量驱动的深度学习解决方案,用于在线推断高性能网络拓扑。xWeaver支持强大的网络模型,该模型支持在不同的性能指标和网络架构上进行拓扑优化。通过设计结构合理的神经网络,可以从数据轨迹中自动导出关键流量模式,并学习目标数据中心特定的流量模式与拓扑配置之间的底层映射关系。经过离线训练后,xWeaver在线生成优化的(或接近最优的)拓扑配置,并且还可以为新的流量模式平滑地更新其模型参数。实验结果表明,xWeaver在支持更短的流程完成时间方面具有显著的性能提升。
{"title":"Neural Network Meets DCN: Traffic-driven Topology Adaptation with Deep Learning","authors":"Mowei Wang, Yong Cui, Shihan Xiao, Xin Wang, Dan Yang, Kai Chen, Jun Zhu","doi":"10.1145/3219617.3219656","DOIUrl":"https://doi.org/10.1145/3219617.3219656","url":null,"abstract":"The emerging optical/wireless topology reconfiguration technologies have shown great potential in improving the performance of data center networks. However, it also poses a big challenge on how to find the best topology configurations to support the dynamic traffic demands. In this work, we present xWeaver, a traffic-driven deep learning solution to infer the high-performance network topology online. xWeaver supports a powerful network model that enables the topology optimization over different performance metrics and network architectures. With the design of properly-structured neural networks, it can automatically derive the critical traffic patterns from data traces and learn the underlying mapping between the traffic patterns and topology configurations specific to the target data center. After offline training, xWeaver generates the optimized (or near-optimal) topology configuration online, and can also smoothly update its model parameters for new traffic patterns. The experiment results show the significant performance gain of xWeaver in supporting smaller flow completion time.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116542322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems 2018年ACM计算机系统测量与建模国际会议摘要
{"title":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","authors":"","doi":"10.1145/3219617","DOIUrl":"https://doi.org/10.1145/3219617","url":null,"abstract":"","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131617836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Session details: Resource Management II 会话详细信息:资源管理
Nicolas Gast
{"title":"Session details: Resource Management II","authors":"Nicolas Gast","doi":"10.1145/3258595","DOIUrl":"https://doi.org/10.1145/3258595","url":null,"abstract":"","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116501310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACM Sigmetrics Performance Evaluation Review: A New Series on Diversity ACM Sigmetrics绩效评估综述:多样性新系列
N. Hegde
This editorial announces a new series on diversity in the ACM Sigmetrics Performance Evaluation Review (PER). In several upcoming and future issues we will feature invited articles on diversity from authors in the performance evaluation community, but also from the larger Computing Science (CS) community. The articles will touch various aspects in CS including K-12 and post-secondary education, graduate studies, academic recruitment, industry perspectives, harassment issues, and gender, ethnicity, and racial bias.
这篇社论宣布了ACM Sigmetrics绩效评估审查(PER)中关于多样性的新系列。在接下来的几期和未来的几期中,我们将邀请来自性能评估社区以及更大的计算科学(CS)社区的作者发表关于多样性的文章。这些文章将涉及CS的各个方面,包括K-12和专上教育、研究生学习、学术招聘、行业前景、骚扰问题以及性别、民族和种族偏见。
{"title":"ACM Sigmetrics Performance Evaluation Review: A New Series on Diversity","authors":"N. Hegde","doi":"10.1145/3219617.3219675","DOIUrl":"https://doi.org/10.1145/3219617.3219675","url":null,"abstract":"This editorial announces a new series on diversity in the ACM Sigmetrics Performance Evaluation Review (PER). In several upcoming and future issues we will feature invited articles on diversity from authors in the performance evaluation community, but also from the larger Computing Science (CS) community. The articles will touch various aspects in CS including K-12 and post-secondary education, graduate studies, academic recruitment, industry perspectives, harassment issues, and gender, ethnicity, and racial bias.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121976551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asymptotic Optimal Control of Markov-Modulated Restless Bandits 马尔可夫调制不动土匪的渐近最优控制
Santiago Duran, I. M. Verloop
This paper studies optimal control subject to changing conditions. This is an area that recently received a lot of attention as it arises in numerous situations in practice. Some applications being cloud computing systems with fluctuating arrival rates, or the time-varying capacity as encountered in power-aware systems or wireless downlink channels. To study this, we focus on a restless bandit model, which has proved to be a powerful stochastic optimization framework to model scheduling of activities. This paper is a first step to its optimal control when restless bandits are subject to changing conditions. We consider the restless bandit problem in an asymptotic regime, which is obtained by letting the population of bandits grow large, and letting the environment change relatively fast. We present sufficient conditions for a policy to be asymptotically optimal and show that a set of priority policies satisfies these. Under an indexability assumption, an averaged version of Whittle's index policy is proved to be inside this set of asymptotic optimal policies. The performance of the averaged Whittle's index policy is numerically evaluated for a multi-class scheduling problem.
本文研究了变化条件下的最优控制问题。这是一个最近受到很多关注的领域,因为它在实践中出现在许多情况下。一些应用程序是云计算系统,其到达率波动,或者在功率感知系统或无线下行链路信道中遇到的时变容量。为了研究这一点,我们重点研究了一个不宁强盗模型,该模型被证明是一个强大的随机优化框架来建模活动调度。本文是研究不安分土匪在变化条件下的最优控制问题的第一步。我们考虑在一个渐近状态下的不宁土匪问题,这个渐近状态是通过让土匪数量增长,并且让环境变化相对较快而得到的。我们给出了策略渐近最优的充分条件,并证明了一组优先级策略满足这些条件。在可索引性假设下,证明了Whittle索引策略的一个平均版本在这组渐近最优策略内。针对多类调度问题,对平均Whittle索引策略的性能进行了数值评价。
{"title":"Asymptotic Optimal Control of Markov-Modulated Restless Bandits","authors":"Santiago Duran, I. M. Verloop","doi":"10.1145/3219617.3219636","DOIUrl":"https://doi.org/10.1145/3219617.3219636","url":null,"abstract":"This paper studies optimal control subject to changing conditions. This is an area that recently received a lot of attention as it arises in numerous situations in practice. Some applications being cloud computing systems with fluctuating arrival rates, or the time-varying capacity as encountered in power-aware systems or wireless downlink channels. To study this, we focus on a restless bandit model, which has proved to be a powerful stochastic optimization framework to model scheduling of activities. This paper is a first step to its optimal control when restless bandits are subject to changing conditions. We consider the restless bandit problem in an asymptotic regime, which is obtained by letting the population of bandits grow large, and letting the environment change relatively fast. We present sufficient conditions for a policy to be asymptotically optimal and show that a set of priority policies satisfies these. Under an indexability assumption, an averaged version of Whittle's index policy is proved to be inside this set of asymptotic optimal policies. The performance of the averaged Whittle's index policy is numerically evaluated for a multi-class scheduling problem.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127431981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Session details: Networking 会话详细信息:网络
B. V. Houdt
{"title":"Session details: Networking","authors":"B. V. Houdt","doi":"10.1145/3258591","DOIUrl":"https://doi.org/10.1145/3258591","url":null,"abstract":"","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114345016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1