This paper explores the potential synergies between 6G and AI, arguing that their combination has the power to unlock new horizons by addressing future challenges in healthcare, transportation, virtual reality, education, resource management, robotics, public safety, and warfare. However, these opportunities also come with greater risks. Therefore, the paper provides an overview of the security risks and challenges associated with this convergence, as well as possible mitigation techniques.
{"title":"Synergy Between 6G and AI: Open Future Horizons and Impending Security Risks","authors":"Elias Yaacoub","doi":"10.37256/cnc.1120232969","DOIUrl":"https://doi.org/10.37256/cnc.1120232969","url":null,"abstract":"This paper explores the potential synergies between 6G and AI, arguing that their combination has the power to unlock new horizons by addressing future challenges in healthcare, transportation, virtual reality, education, resource management, robotics, public safety, and warfare. However, these opportunities also come with greater risks. Therefore, the paper provides an overview of the security risks and challenges associated with this convergence, as well as possible mitigation techniques.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135494058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Hemmes, Steven Fulton, Judson C. Dressler, Stephen Kirkman
The Internet of Things (IoT) is a large-scale, heterogeneous ecosystem of connected devices encompassing a range of purposes and computing capabilities. As IoT systems grow ubiquitous, new approaches to security are needed. This work proposes a method of risk assessment for devices that combines the use of trust models based on dynamic behaviors with static capability profiles drawn from immutable device characteristics to determine the level of risk each device poses to network security. A risk-based approach allows security mechanisms and monitoring activities to be more efficiently allocated across IoT networks. Simultaneously, devices can be allowed a greater degree of functionality while ensuring system availability and security. This paper presents a methodology and architecture to integrate risk assessment into IoT networks. This allows additional tailoring of security control application and provides higher-level, more human-readable information for security analysts.
{"title":"Trust and Risk Assessment in IoT Networks","authors":"J. Hemmes, Steven Fulton, Judson C. Dressler, Stephen Kirkman","doi":"10.37256/cnc.1120232667","DOIUrl":"https://doi.org/10.37256/cnc.1120232667","url":null,"abstract":"The Internet of Things (IoT) is a large-scale, heterogeneous ecosystem of connected devices encompassing a range of purposes and computing capabilities. As IoT systems grow ubiquitous, new approaches to security are needed. This work proposes a method of risk assessment for devices that combines the use of trust models based on dynamic behaviors with static capability profiles drawn from immutable device characteristics to determine the level of risk each device poses to network security. A risk-based approach allows security mechanisms and monitoring activities to be more efficiently allocated across IoT networks. Simultaneously, devices can be allowed a greater degree of functionality while ensuring system availability and security. This paper presents a methodology and architecture to integrate risk assessment into IoT networks. This allows additional tailoring of security control application and provides higher-level, more human-readable information for security analysts.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75209628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The ability to describe experimentally obtained delay values in a cell of a mobile cellular network allows not only describing the properties of cell delays using only a few parameters, but also to simulate delay values. Unfortunately, occasionally occurring temporary unstable operation of a cellular network, caused by various negative factors, leads to a noticeable increase in delays and, as a result, to a significant distortion of the obtained delay parameters estimates. For this reason, estimates of the delay parameters in a cell should be obtained from experimental data obtained at the time of stable operation of the network. Due to the large amount of experimentally obtained data, the process of checking experimentally obtained delay values for the presence of anomalies should be performed on the application of simple criteria. The aim of this paper is to show an approach to obtaining stable parameter estimates of delay in a cell of a mobile cellular network. The article describes the factors that affect delays stability, assesses the degree of their influence, and also highlights properties that can be used to recognize phenomena that adversely affect the value and stability of delays in order to exclude such experimentally obtained data from the evaluation.
{"title":"An Approach to Obtaining Stable Parameter Estimates Using Experimentally Obtained Delay Values in a Cellular Mobile Network","authors":"Aleksandrs Kutins, Deniss Brodņevs","doi":"10.37256/cnc.1120232829","DOIUrl":"https://doi.org/10.37256/cnc.1120232829","url":null,"abstract":"The ability to describe experimentally obtained delay values in a cell of a mobile cellular network allows not only describing the properties of cell delays using only a few parameters, but also to simulate delay values. Unfortunately, occasionally occurring temporary unstable operation of a cellular network, caused by various negative factors, leads to a noticeable increase in delays and, as a result, to a significant distortion of the obtained delay parameters estimates. For this reason, estimates of the delay parameters in a cell should be obtained from experimental data obtained at the time of stable operation of the network. Due to the large amount of experimentally obtained data, the process of checking experimentally obtained delay values for the presence of anomalies should be performed on the application of simple criteria. The aim of this paper is to show an approach to obtaining stable parameter estimates of delay in a cell of a mobile cellular network. The article describes the factors that affect delays stability, assesses the degree of their influence, and also highlights properties that can be used to recognize phenomena that adversely affect the value and stability of delays in order to exclude such experimentally obtained data from the evaluation.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89950216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Machine learning now confronts two significant obstacles: the first is data isolation in most organizations' silos, and the second is data privacy and security enforcement. The widespread application of Machine Learning techniques in patient care is currently hampered by limited dataset availability for algorithm training and validation due to the lack of standardised electronic medical records and strict legal and ethical requirements to protect patient privacy. To avoid compromising patient privacy while supporting scientific analysis on massive datasets to improve patient care, it is necessary to analyse and implement Machine Learning solutions that fulfil data security and consumption demands. In this survey paper, we meticulously explain the existing works of federated learning from many perspectives to give a thorough overview and promote future research in this area. Then, we determine the current challenges, attack vectors and potential prospects for federated learning research. We analysed the similarities, differences and advantages between federated learning and other machine learning techniques. We also discussed about system and statistical heterogeneity and related efficient algorithms.
{"title":"Survey: An Overview on Privacy Preserving Federated Learning in Health Data","authors":"Manzur Elahi, Hui Cui, Mohammed Kaosar","doi":"10.37256/cnc.1120231992","DOIUrl":"https://doi.org/10.37256/cnc.1120231992","url":null,"abstract":"Machine learning now confronts two significant obstacles: the first is data isolation in most organizations' silos, and the second is data privacy and security enforcement. The widespread application of Machine Learning techniques in patient care is currently hampered by limited dataset availability for algorithm training and validation due to the lack of standardised electronic medical records and strict legal and ethical requirements to protect patient privacy. To avoid compromising patient privacy while supporting scientific analysis on massive datasets to improve patient care, it is necessary to analyse and implement Machine Learning solutions that fulfil data security and consumption demands. In this survey paper, we meticulously explain the existing works of federated learning from many perspectives to give a thorough overview and promote future research in this area. Then, we determine the current challenges, attack vectors and potential prospects for federated learning research. We analysed the similarities, differences and advantages between federated learning and other machine learning techniques. We also discussed about system and statistical heterogeneity and related efficient algorithms.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77199392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianhe Du, K. Ahn, Mohamed M. G. Farag, Hesham A Rakha
As communication technology is developing at a rapid pace, connected vehicles (CVs) can potentially enhance vehicle safety while reducing vehicle energy consumption and emissions via data sharing. Many researchers have attempted to quantify the impacts of such CV applications and vehicle-to-everything (V2X) communication, or the instant and accurate communication among vehicles, devices, pedestrians, infrastructure, network, cloud, and grid. Cellular V2X (C-V2X) has gained interest as an efficient method for this data sharing. In releases 14 and 15, C-V2X uses 4G LTE technology, and in release 16, it uses the latest 5G new radio (NR) technology. Among its benefits, C-V2X can function even with no network infrastructure coverage; in addition, C-V2X surpasses older technologies in terms of communication range, latency, and data rates. Highly efficient information interchange in a CV environment can provide timely data to enhance the transportation system's capacity, and it can support applications that improve vehicle safety and minimize negative impacts on the environment. Achieving the full benefits of CVs requires rigorous investigation into the effectiveness, strengths, and weaknesses of different CV applications. It also calls for deeper understanding of the communication protocols, results with different CV market penetration rates (MPRs), CV- and human-driven vehicle interactions, integration of multiple applications, and errors and latencies associated with data communication. This paper includes a review of existing literature on the safety, mobility, and environmental impacts of CV applications; gaps in current CV research; and recommended directions for future research. The results of this paper will help shape future research for CV applications to realize their full potential.
{"title":"Impacts of Vehicle-to-Everything Enabled Applications: Literature Review of Existing Studies","authors":"Jianhe Du, K. Ahn, Mohamed M. G. Farag, Hesham A Rakha","doi":"10.37256/cnc.1120232115","DOIUrl":"https://doi.org/10.37256/cnc.1120232115","url":null,"abstract":"As communication technology is developing at a rapid pace, connected vehicles (CVs) can potentially enhance vehicle safety while reducing vehicle energy consumption and emissions via data sharing. Many researchers have attempted to quantify the impacts of such CV applications and vehicle-to-everything (V2X) communication, or the instant and accurate communication among vehicles, devices, pedestrians, infrastructure, network, cloud, and grid. Cellular V2X (C-V2X) has gained interest as an efficient method for this data sharing. In releases 14 and 15, C-V2X uses 4G LTE technology, and in release 16, it uses the latest 5G new radio (NR) technology. Among its benefits, C-V2X can function even with no network infrastructure coverage; in addition, C-V2X surpasses older technologies in terms of communication range, latency, and data rates. Highly efficient information interchange in a CV environment can provide timely data to enhance the transportation system's capacity, and it can support applications that improve vehicle safety and minimize negative impacts on the environment. Achieving the full benefits of CVs requires rigorous investigation into the effectiveness, strengths, and weaknesses of different CV applications. It also calls for deeper understanding of the communication protocols, results with different CV market penetration rates (MPRs), CV- and human-driven vehicle interactions, integration of multiple applications, and errors and latencies associated with data communication. This paper includes a review of existing literature on the safety, mobility, and environmental impacts of CV applications; gaps in current CV research; and recommended directions for future research. The results of this paper will help shape future research for CV applications to realize their full potential.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80098116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The centralized joint access point (AP) association and radio resource allocation problem in time-sharing based dense WLANs with heterogeneous station (STA) throughput demands and identical AP transmission power is considered in this paper. The problem is formulated as an NP-hard single non-zero programming (SNZP) optimization problem with three different throughput-based objective functions, including the maximal aggregate (MA) throughput, the max-min fair (MMF) throughput and the proportionally fair (PF) throughput. To solve the NP-hard SNZP problem, based on the optimal branch-and-bound (BnB) searching approach, two novel efficient algorithms, the optimal BnB and the suboptimal depth-first BnB (DF-BnB) algorithms, are proposed, which can be used as convenient performance benchmarks in the study of the problem considered. The complexity of the proposed algorithms is analyzed theoretically. Numerical results are presented to investigate and compare the performance and complexity of the proposed algorithms under the three different design criteria, which can help in choosing an appropriate cost function objective in practical system design.
{"title":"Efficient Optimal and Suboptimal Joint Access Point Association and Radio Resource Allocation in WLANs","authors":"Zhiwei Mao","doi":"10.37256/cnc.1120231689","DOIUrl":"https://doi.org/10.37256/cnc.1120231689","url":null,"abstract":"The centralized joint access point (AP) association and radio resource allocation problem in time-sharing based dense WLANs with heterogeneous station (STA) throughput demands and identical AP transmission power is considered in this paper. The problem is formulated as an NP-hard single non-zero programming (SNZP) optimization problem with three different throughput-based objective functions, including the maximal aggregate (MA) throughput, the max-min fair (MMF) throughput and the proportionally fair (PF) throughput. To solve the NP-hard SNZP problem, based on the optimal branch-and-bound (BnB) searching approach, two novel efficient algorithms, the optimal BnB and the suboptimal depth-first BnB (DF-BnB) algorithms, are proposed, which can be used as convenient performance benchmarks in the study of the problem considered. The complexity of the proposed algorithms is analyzed theoretically. Numerical results are presented to investigate and compare the performance and complexity of the proposed algorithms under the three different design criteria, which can help in choosing an appropriate cost function objective in practical system design.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2023-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74827696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This work proposes a flexible and scalable Smart Rural (SR) system for gathering and processing IoT data from remote rural areas with no traditional communication coverage as a handicap. We offer an architecture structured in distinct segments using emerging technologies such as IoT, 5G, Cloud and High Altitude Platform Station (HAPS). This proposal is applied to the rural environment to cover thus all the needs of the system in the collection of IoT data from these remote rural areas, its coverage by space vehicles and its processing and storage through 5G terrestrial networks and cloud services. The proposal includes the deployment of IoT sensors and the development of Amazon Web Services (AWS). On the other hand, the part of the space segment considered by HAPS has been simulated for different space channels. This way offers a complete and automated SR system that allows access to these IoT data from remote rural areas through the Internet.
{"title":"High Altitude Platform Stations Aided Cloud-Computing Solution for Rural-Environment IoT Applications","authors":"Victor Monzon Baeza, Manuel Alvarez Marban","doi":"10.37256/cnc.1120232107","DOIUrl":"https://doi.org/10.37256/cnc.1120232107","url":null,"abstract":"This work proposes a flexible and scalable Smart Rural (SR) system for gathering and processing IoT data from remote rural areas with no traditional communication coverage as a handicap. We offer an architecture structured in distinct segments using emerging technologies such as IoT, 5G, Cloud and High Altitude Platform Station (HAPS). This proposal is applied to the rural environment to cover thus all the needs of the system in the collection of IoT data from these remote rural areas, its coverage by space vehicles and its processing and storage through 5G terrestrial networks and cloud services. The proposal includes the deployment of IoT sensors and the development of Amazon Web Services (AWS). On the other hand, the part of the space segment considered by HAPS has been simulated for different space channels. This way offers a complete and automated SR system that allows access to these IoT data from remote rural areas through the Internet.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86999581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The focus of this work is on minimizing the time average of the weighted sum of the Age-of-Information in a multi-sensor system in the setting where all sensors report their measurements to a central monitoring station using a shared communication channel. We consider multiple information settings including complete CSI/delayed CSI/no CSI and two stochastic channel evolution models, i.e., i.i.d. channels and Markovian channels. In all settings considered, we prove the indexability of the scheduling problem. In addition, we compute the Whittle Index in closed form for some of the settings. Indexability for Markovian channels for the objective of minimizing AoI is a key contribution of this work. Further, under i.i.d. channels, we propose a novel efficient implementation for the Whittle Index-based policy. We use simulations to show that Whittle Index-based scheduling policies either outperform or match the performance of the state-of-the-art policies for all the settings considered.
{"title":"Whittle Index Based Age-of-Information Aware Scheduling for Markovian Channels","authors":"Bejjipuram Sombabu, Bhishma Dedhia, Sharayu Moharir","doi":"10.37256/cnc.1120231701","DOIUrl":"https://doi.org/10.37256/cnc.1120231701","url":null,"abstract":"The focus of this work is on minimizing the time average of the weighted sum of the Age-of-Information in a multi-sensor system in the setting where all sensors report their measurements to a central monitoring station using a shared communication channel. We consider multiple information settings including complete CSI/delayed CSI/no CSI and two stochastic channel evolution models, i.e., i.i.d. channels and Markovian channels. In all settings considered, we prove the indexability of the scheduling problem. In addition, we compute the Whittle Index in closed form for some of the settings. Indexability for Markovian channels for the objective of minimizing AoI is a key contribution of this work. Further, under i.i.d. channels, we propose a novel efficient implementation for the Whittle Index-based policy. We use simulations to show that Whittle Index-based scheduling policies either outperform or match the performance of the state-of-the-art policies for all the settings considered.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80406561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lin Han, Alvaro Retana, Cedric Westphal, Richard Li
This document analyses the problems and challenges of addressing and routing to Low Earth Orbit (LEO) satellites used for the future Internet. It focuses on the scenario where Inter-Satellite-Links (ISL) are used for massive LEO satellite constellation. Such LEO satellite network is the key to the Non-terrestrial Network (NTN) integration with 5G and beyond. The paper describes two categories of solutions. One is based on IPv6 and another is based on a new protocol, New IP. The two categories of solutions are a) using new types of addresses for LEO satellites and b) new concepts for routing with these addresses. The semantic addressing scheme leverages the characteristics of satellites with known orbit elements; and simplifies the satellite identification by using limited indexes. The routing method combines semantic addressing with source routing and generates a new semantic routing scheme. Compared with traditional methods, the new proposals dramatically reduce the workload in satellite, such as table size, Ternary Content-addressable memory (TCAM) lookups, and packet header size. Thus it is more suitable to networks in space where the harsh environment limits the hardware performance, power consumption, link bandwidth and system complexity.
{"title":"Large Scale LEO Satellite Networks for the Future Internet: Challenges and Solutions to Addressing and Routing","authors":"Lin Han, Alvaro Retana, Cedric Westphal, Richard Li","doi":"10.37256/cnc.1120232105","DOIUrl":"https://doi.org/10.37256/cnc.1120232105","url":null,"abstract":"This document analyses the problems and challenges of addressing and routing to Low Earth Orbit (LEO) satellites used for the future Internet. It focuses on the scenario where Inter-Satellite-Links (ISL) are used for massive LEO satellite constellation. Such LEO satellite network is the key to the Non-terrestrial Network (NTN) integration with 5G and beyond. The paper describes two categories of solutions. One is based on IPv6 and another is based on a new protocol, New IP. The two categories of solutions are a) using new types of addresses for LEO satellites and b) new concepts for routing with these addresses. The semantic addressing scheme leverages the characteristics of satellites with known orbit elements; and simplifies the satellite identification by using limited indexes. The routing method combines semantic addressing with source routing and generates a new semantic routing scheme. Compared with traditional methods, the new proposals dramatically reduce the workload in satellite, such as table size, Ternary Content-addressable memory (TCAM) lookups, and packet header size. Thus it is more suitable to networks in space where the harsh environment limits the hardware performance, power consumption, link bandwidth and system complexity.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78685871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. S. C. L. Narayana, Sucheta Ravikanti, Harsh Deshpande, Sharayu Moharir
Software as a Service (SaaS) instances often use edge resources to serve their customers. The version of the service hosted at the edge needs to be periodically updated to maximize the utility derived by the customers. We focus on scheduling updates in the setting where the utility derived from a version is an unknown decreasing function of the time elapsed since the version was created. We map the scheduling problem to a multi-arm bandit and propose an update policy. We characterize its performance and compare it with the fundamental limit on the performance of any online policy.
{"title":"Scheduling Service Updates: A Multi-arm Bandit Approach","authors":"V. S. C. L. Narayana, Sucheta Ravikanti, Harsh Deshpande, Sharayu Moharir","doi":"10.37256/cnc.1120231686","DOIUrl":"https://doi.org/10.37256/cnc.1120231686","url":null,"abstract":"Software as a Service (SaaS) instances often use edge resources to serve their customers. The version of the service hosted at the edge needs to be periodically updated to maximize the utility derived by the customers. We focus on scheduling updates in the setting where the utility derived from a version is an unknown decreasing function of the time elapsed since the version was created. We map the scheduling problem to a multi-arm bandit and propose an update policy. We characterize its performance and compare it with the fundamental limit on the performance of any online policy.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75868877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}