首页 > 最新文献

ACM Transactions on Autonomous and Adaptive Systems最新文献

英文 中文
A Cooperative Predictive Control Approach to Improve the Reconfiguration Stability of Adaptive Distributed Parallel Applications 一种提高自适应分布式并行系统重构稳定性的协同预测控制方法
IF 2.7 4区 计算机科学 Q2 Computer Science Pub Date : 2014-03-01 DOI: 10.1145/2567929
G. Mencagli, M. Vanneschi, E. Vespa
Adaptiveness in distributed parallel applications is a key feature to provide satisfactory performance results in the face of unexpected events such as workload variations and time-varying user requirements. The adaptation process is based on the ability to change specific characteristics of parallel components (e.g., their parallelism degree) and to guarantee that such modifications of the application configuration are effective and durable. Reconfigurations often incur a cost on the execution (a performance overhead and/or an economic cost). For this reason advanced adaptation strategies have become of paramount importance. Effective strategies must achieve properties like control optimality (making decisions that optimize the global application QoS), reconfiguration stability expressed in terms of the average time between consecutive reconfigurations of the same component, and optimizing the reconfiguration amplitude (number of allocated/deallocated resources). To control such parameters, in this article we propose a method based on a Cooperative Model-based Predictive Control approach in which application controllers cooperate to make optimal reconfigurations and taking account of the durability and amplitude of their control decisions. The effectiveness and the feasibility of the methodology is demonstrated through experiments performed in a simulation environment and by comparing it with other existing techniques.
分布式并行应用程序中的适应性是在面对诸如工作负载变化和随时间变化的用户需求等意外事件时提供令人满意的性能结果的关键特性。适应过程基于改变并行组件的特定特征(例如,它们的并行度)的能力,并保证对应用程序配置的这种修改是有效和持久的。重新配置通常会在执行时产生成本(性能开销和/或经济成本)。因此,先进的适应战略已变得至关重要。有效的策略必须实现诸如控制最优性(做出优化全局应用QoS的决策)、以相同组件连续重新配置之间的平均时间表示的重新配置稳定性以及优化重新配置幅度(分配/释放资源的数量)等属性。为了控制这些参数,在本文中,我们提出了一种基于合作模型的预测控制方法,其中应用控制器合作进行最优重构,并考虑其控制决策的持久性和振幅。通过在仿真环境中进行的实验以及与其他现有技术的比较,证明了该方法的有效性和可行性。
{"title":"A Cooperative Predictive Control Approach to Improve the Reconfiguration Stability of Adaptive Distributed Parallel Applications","authors":"G. Mencagli, M. Vanneschi, E. Vespa","doi":"10.1145/2567929","DOIUrl":"https://doi.org/10.1145/2567929","url":null,"abstract":"Adaptiveness in distributed parallel applications is a key feature to provide satisfactory performance results in the face of unexpected events such as workload variations and time-varying user requirements. The adaptation process is based on the ability to change specific characteristics of parallel components (e.g., their parallelism degree) and to guarantee that such modifications of the application configuration are effective and durable. Reconfigurations often incur a cost on the execution (a performance overhead and/or an economic cost). For this reason advanced adaptation strategies have become of paramount importance. Effective strategies must achieve properties like control optimality (making decisions that optimize the global application QoS), reconfiguration stability expressed in terms of the average time between consecutive reconfigurations of the same component, and optimizing the reconfiguration amplitude (number of allocated/deallocated resources). To control such parameters, in this article we propose a method based on a Cooperative Model-based Predictive Control approach in which application controllers cooperate to make optimal reconfigurations and taking account of the durability and amplitude of their control decisions. The effectiveness and the feasibility of the methodology is demonstrated through experiments performed in a simulation environment and by comparing it with other existing techniques.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78676945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Modeling and Defending against Adaptive BitTorrent Worms in Peer-to-Peer Networks 点对点网络中自适应bt蠕虫的建模和防御
IF 2.7 4区 计算机科学 Q2 Computer Science Pub Date : 2014-03-01 DOI: 10.1145/2567925
Jiaqing Luo, Bin Xiao, Qingjun Xiao, Jiannong Cao, M. Guo
BitTorrent (BT) is one of the most common Peer-to-Peer (P2P) file sharing protocols. Rather than downloading a file from a single source, the protocol allows users to join a swarm of peers to download and upload from each other simultaneously. Worms exploiting information from BT servers or trackers can cause serious damage to participating peers, which unfortunately has been neglected previously. In this article, we first present a new worm, called Adaptive BitTorrent worm (A-BT worm), which finds new victims and propagates sending forged requests to trackers. To reduce its abnormal behavior, the worm estimates the ratio of infected peers and adaptively adjusts its propagation speed. We then build a hybrid model to precisely characterize the propagation behavior of the worm. We also propose a statistical method to automatically detect the worm from the tracker by estimating the variance of the time intervals of requests. To slow down the worm propagation, we design a safe strategy in which the tracker returns secured peers when receives a request. Finally, we evaluate the accuracy of the hybrid model, and the effectiveness of our detection method and containment strategy through simulations.
BitTorrent (BT)是最常见的点对点(P2P)文件共享协议之一。与从单一来源下载文件不同,该协议允许用户加入一群对等体,同时从彼此处下载和上传文件。利用BT服务器或跟踪器信息的蠕虫会对参与的同伴造成严重损害,不幸的是,这一点以前被忽视了。在本文中,我们首先介绍一种新的蠕虫,称为自适应bt蠕虫(a - bt蠕虫),它发现新的受害者并传播向跟踪器发送伪造请求。为了减少其异常行为,蠕虫估计被感染的同伴的比例,并自适应调整其传播速度。然后,我们建立了一个混合模型来精确表征蠕虫的传播行为。我们还提出了一种统计方法,通过估计请求时间间隔的方差来自动检测跟踪器中的蠕虫。为了减缓蠕虫的传播,我们设计了一种安全策略,当接收到请求时,跟踪器返回安全的对等体。最后,通过仿真验证了混合模型的准确性,以及我们的检测方法和遏制策略的有效性。
{"title":"Modeling and Defending against Adaptive BitTorrent Worms in Peer-to-Peer Networks","authors":"Jiaqing Luo, Bin Xiao, Qingjun Xiao, Jiannong Cao, M. Guo","doi":"10.1145/2567925","DOIUrl":"https://doi.org/10.1145/2567925","url":null,"abstract":"BitTorrent (BT) is one of the most common Peer-to-Peer (P2P) file sharing protocols. Rather than downloading a file from a single source, the protocol allows users to join a swarm of peers to download and upload from each other simultaneously. Worms exploiting information from BT servers or trackers can cause serious damage to participating peers, which unfortunately has been neglected previously. In this article, we first present a new worm, called Adaptive BitTorrent worm (A-BT worm), which finds new victims and propagates sending forged requests to trackers. To reduce its abnormal behavior, the worm estimates the ratio of infected peers and adaptively adjusts its propagation speed. We then build a hybrid model to precisely characterize the propagation behavior of the worm. We also propose a statistical method to automatically detect the worm from the tracker by estimating the variance of the time intervals of requests. To slow down the worm propagation, we design a safe strategy in which the tracker returns secured peers when receives a request. Finally, we evaluate the accuracy of the hybrid model, and the effectiveness of our detection method and containment strategy through simulations.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88985134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus, and Fishing 用于防御DoS,间谍软件,恶意软件,病毒和钓鱼的仿生自主神经系统
IF 2.7 4区 计算机科学 Q2 Computer Science Pub Date : 2014-03-01 DOI: 10.1145/2567924
Yuan-Shun Dai, Yanping Xiang, Yi Pan
Computing systems and networks become increasingly large and complex with a variety of compromises and vulnerabilities. The network security and privacy are of great concern today, where self-defense against different kinds of attacks in an autonomous and holistic manner is a challenging topic. To address this problem, we developed an innovative technology called Bionic Autonomic Nervous System (BANS). The BANS is analogous to biological nervous system, which consists of basic modules like cyber axon, cyber neuron, peripheral nerve and central nerve. We also presented an innovative self-defense mechanism which utilizes the Fuzzy Logic, Neural Networks, and Entropy Awareness, etc. Equipped with the BANS, computer and network systems can intelligently self-defend against both known and unknown compromises/attacks including denial of services (DoS), spyware, malware, and virus. BANS also enabled multiple computers to collaboratively fight against some distributed intelligent attacks like DDoS. We have implemented the BANS in practice. Some case studies and experimental results exhibited the effectiveness and efficiency of the BANS and the self-defense mechanism.
计算系统和网络变得越来越庞大和复杂,有各种各样的妥协和漏洞。当今,网络安全和隐私问题备受关注,如何以自主和整体的方式防御各种攻击是一个具有挑战性的话题。为了解决这个问题,我们开发了一种名为仿生自主神经系统(BANS)的创新技术。ban类似于生物神经系统,由网络轴突、网络神经元、周围神经和中枢神经等基本模块组成。我们还提出了一种利用模糊逻辑、神经网络和熵感知等创新的自我防御机制。配备ban后,电脑和网络系统可以智能地自我防御已知和未知的危害/攻击,包括拒绝服务(DoS)、间谍软件、恶意软件和病毒。ban还使多台计算机能够协同对抗一些分布式智能攻击,如DDoS。我们已经在实践中实施了ban。一些案例研究和实验结果显示了ban和自卫机制的有效性和效率。
{"title":"Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus, and Fishing","authors":"Yuan-Shun Dai, Yanping Xiang, Yi Pan","doi":"10.1145/2567924","DOIUrl":"https://doi.org/10.1145/2567924","url":null,"abstract":"Computing systems and networks become increasingly large and complex with a variety of compromises and vulnerabilities. The network security and privacy are of great concern today, where self-defense against different kinds of attacks in an autonomous and holistic manner is a challenging topic. To address this problem, we developed an innovative technology called Bionic Autonomic Nervous System (BANS). The BANS is analogous to biological nervous system, which consists of basic modules like cyber axon, cyber neuron, peripheral nerve and central nerve. We also presented an innovative self-defense mechanism which utilizes the Fuzzy Logic, Neural Networks, and Entropy Awareness, etc. Equipped with the BANS, computer and network systems can intelligently self-defend against both known and unknown compromises/attacks including denial of services (DoS), spyware, malware, and virus. BANS also enabled multiple computers to collaboratively fight against some distributed intelligent attacks like DDoS. We have implemented the BANS in practice. Some case studies and experimental results exhibited the effectiveness and efficiency of the BANS and the self-defense mechanism.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77738282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mitigating DoS Attacks Using Performance Model-Driven Adaptive Algorithms 使用性能模型驱动的自适应算法减轻DoS攻击
IF 2.7 4区 计算机科学 Q2 Computer Science Pub Date : 2014-03-01 DOI: 10.1145/2567926
C. Barna, Mark Shtern, Michael Smit, Vassilios Tzerpos, Marin Litoiu
Denial of Service (DoS) attacks overwhelm online services, preventing legitimate users from accessing a service, often with impact on revenue or consumer trust. Approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at this level can be computationally expensive and difficult to scale, while still producing false positives that block legitimate users. This article presents a model-based adaptive architecture and algorithm for detecting DoS attacks at the web application level and mitigating them. Using a performance model to predict the impact of arriving requests, a decision engine adaptively generates rules for filtering traffic and sending suspicious traffic for further review, where the end user is given the opportunity to demonstrate they are a legitimate user. If no legitimate user responds to the challenge, the request is dropped. Experiments performed on a scalable implementation demonstrate effective mitigation of attacks launched using a real-world DoS attack tool.
拒绝服务(DoS)攻击使在线服务不堪重负,阻止合法用户访问服务,通常会影响收入或消费者信任。存在过滤网络级攻击的方法,但是在防火墙中很难检测到应用程序级攻击。这种级别的过滤在计算上可能很昂贵,而且难以扩展,同时仍然会产生误报,从而阻止合法用户。本文提出了一种基于模型的自适应架构和算法,用于在web应用程序级别检测并减轻DoS攻击。决策引擎使用性能模型预测到达请求的影响,自适应地生成过滤流量和发送可疑流量以供进一步审查的规则,最终用户有机会证明自己是合法用户。如果没有合法用户响应挑战,请求将被丢弃。在可扩展的实现上进行的实验证明了使用真实的DoS攻击工具发起的攻击的有效缓解。
{"title":"Mitigating DoS Attacks Using Performance Model-Driven Adaptive Algorithms","authors":"C. Barna, Mark Shtern, Michael Smit, Vassilios Tzerpos, Marin Litoiu","doi":"10.1145/2567926","DOIUrl":"https://doi.org/10.1145/2567926","url":null,"abstract":"Denial of Service (DoS) attacks overwhelm online services, preventing legitimate users from accessing a service, often with impact on revenue or consumer trust. Approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at this level can be computationally expensive and difficult to scale, while still producing false positives that block legitimate users.\u0000 This article presents a model-based adaptive architecture and algorithm for detecting DoS attacks at the web application level and mitigating them. Using a performance model to predict the impact of arriving requests, a decision engine adaptively generates rules for filtering traffic and sending suspicious traffic for further review, where the end user is given the opportunity to demonstrate they are a legitimate user. If no legitimate user responds to the challenge, the request is dropped. Experiments performed on a scalable implementation demonstrate effective mitigation of attacks launched using a real-world DoS attack tool.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90442699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Design and Performance Evaluation of Data Dissemination Systems for Opportunistic Networks Based on Cognitive Heuristics 基于认知启发式的机会网络数据传播系统设计与性能评估
IF 2.7 4区 计算机科学 Q2 Computer Science Pub Date : 2013-09-01 DOI: 10.1145/2518017.2518018
M. Conti, M. Mordacchini, A. Passarella
In the convergence of the Cyber-Physical World, user devices will act as proxies of the humans in the cyber world. They will be required to act in a vast information landscape, asserting the relevance of data spread in the cyber world, in order to let their human users become aware of the content they really need. This is a remarkably similar situation to what the human brain has to do all the time when deciding what information coming from the surrounding environment is interesting and what can simply be ignored. The brain performs this task using so called cognitive heuristics, i.e. simple, rapid, yet very effective schemes. In this article, we propose a new approach that exploits one of these heuristics, the recognition heuristic, for developing a self-adaptive system that deals with effective data dissemination in opportunistic networks. We show how to implement it and provide an extensive analysis via simulation. Specifically, results show that the proposed solution is as effective as state-of-the-art solutions for data dissemination in opportunistic networks, while requiring far less resources. Finally, our sensitiveness analysis shows how various parameters depend on the context where nodes are situated, and suggest corresponding optimal configurations for the algorithm.
在网络-物理世界的融合中,用户设备将充当网络世界中人类的代理。它们将被要求在一个巨大的信息环境中行动,维护网络世界中传播的数据的相关性,以便让它们的人类用户意识到他们真正需要的内容。这与人类大脑在决定来自周围环境的哪些信息是有趣的,哪些是可以忽略的时候所做的事情非常相似。大脑使用所谓的认知启发式来完成这项任务,即简单、快速、但非常有效的方案。在本文中,我们提出了一种利用这些启发式方法之一的新方法,即识别启发式,用于开发一种自适应系统,该系统可以处理机会主义网络中有效的数据传播。我们将展示如何实现它,并通过模拟提供广泛的分析。具体而言,结果表明,所提出的解决方案与机会主义网络中最先进的数据传播解决方案一样有效,同时所需的资源要少得多。最后,我们的敏感性分析显示了各种参数如何依赖于节点所在的环境,并为算法提出了相应的最佳配置。
{"title":"Design and Performance Evaluation of Data Dissemination Systems for Opportunistic Networks Based on Cognitive Heuristics","authors":"M. Conti, M. Mordacchini, A. Passarella","doi":"10.1145/2518017.2518018","DOIUrl":"https://doi.org/10.1145/2518017.2518018","url":null,"abstract":"In the convergence of the Cyber-Physical World, user devices will act as proxies of the humans in the cyber world. They will be required to act in a vast information landscape, asserting the relevance of data spread in the cyber world, in order to let their human users become aware of the content they really need. This is a remarkably similar situation to what the human brain has to do all the time when deciding what information coming from the surrounding environment is interesting and what can simply be ignored. The brain performs this task using so called cognitive heuristics, i.e. simple, rapid, yet very effective schemes. In this article, we propose a new approach that exploits one of these heuristics, the recognition heuristic, for developing a self-adaptive system that deals with effective data dissemination in opportunistic networks. We show how to implement it and provide an extensive analysis via simulation. Specifically, results show that the proposed solution is as effective as state-of-the-art solutions for data dissemination in opportunistic networks, while requiring far less resources. Finally, our sensitiveness analysis shows how various parameters depend on the context where nodes are situated, and suggest corresponding optimal configurations for the algorithm.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78107695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Robust Regulation Adaptation in Multi-Agent Systems 多智能体系统的鲁棒调节自适应
IF 2.7 4区 计算机科学 Q2 Computer Science Pub Date : 2013-09-01 DOI: 10.1145/2517328
J. Miralles, M. López-Sánchez, Maria Salamó, Pedro Avila, J. Rodríguez-Aguilar
Adaptive organisation-centred multi-agent systems can dynamically modify their organisational components to better accomplish their goals. Our research line proposes an abstract distributed architecture (2-LAMA) to endow an organisation with adaptation capabilities. This article focuses on regulation-adaptation based on a machine learning approach, in which adaptation is learned by applying a tailored case-based reasoning method. We evaluate the robustness of the system when it is populated by non compliant agents. The evaluation is performed in a peer-to-peer sharing network scenario. Results show that our proposal significantly improves system performance and can cope with regulation violators without incorporating any specific regulation-compliance enforcement mechanisms.
以组织为中心的自适应多智能体系统可以动态地修改其组织组件,以更好地实现其目标。我们的研究路线提出了一个抽象的分布式架构(2-LAMA)来赋予组织适应能力。本文重点关注基于机器学习方法的调节适应,其中适应性是通过应用定制的基于案例的推理方法来学习的。当系统被不兼容的代理填充时,我们评估系统的鲁棒性。在点对点共享网络场景下进行评估。结果表明,我们的建议显著提高了系统性能,并且可以在不纳入任何特定的法规遵守执行机制的情况下处理违规者。
{"title":"Robust Regulation Adaptation in Multi-Agent Systems","authors":"J. Miralles, M. López-Sánchez, Maria Salamó, Pedro Avila, J. Rodríguez-Aguilar","doi":"10.1145/2517328","DOIUrl":"https://doi.org/10.1145/2517328","url":null,"abstract":"Adaptive organisation-centred multi-agent systems can dynamically modify their organisational components to better accomplish their goals. Our research line proposes an abstract distributed architecture (2-LAMA) to endow an organisation with adaptation capabilities. This article focuses on regulation-adaptation based on a machine learning approach, in which adaptation is learned by applying a tailored case-based reasoning method. We evaluate the robustness of the system when it is populated by non compliant agents. The evaluation is performed in a peer-to-peer sharing network scenario. Results show that our proposal significantly improves system performance and can cope with regulation violators without incorporating any specific regulation-compliance enforcement mechanisms.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83798723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Achieving Socially Optimal Outcomes in Multiagent Systems with Reinforcement Social Learning 用强化社会学习实现多智能体系统的社会最优结果
IF 2.7 4区 计算机科学 Q2 Computer Science Pub Date : 2013-09-01 DOI: 10.1145/2517329
Jianye Hao, Ho-fung Leung
In multiagent systems, social optimality is a desirable goal to achieve in terms of maximizing the global efficiency of the system. We study the problem of coordinating on socially optimal outcomes among a population of agents, in which each agent randomly interacts with another agent from the population each round. Previous work [Hales and Edmonds 2003; Matlock and Sen 2007, 2009] mainly resorts to modifying the interaction protocol from random interaction to tag-based interactions and only focus on the case of symmetric games. Besides, in previous work the agents’ decision making processes are usually based on evolutionary learning, which usually results in high communication cost and high deviation on the coordination rate. To solve these problems, we propose an alternative social learning framework with two major contributions as follows. First, we introduce the observation mechanism to reduce the amount of communication required among agents. Second, we propose that the agents’ learning strategies should be based on reinforcement learning technique instead of evolutionary learning. Each agent explicitly keeps the record of its current state in its learning strategy, and learn its optimal policy for each state independently. In this way, the learning performance is much more stable and also it is suitable for both symmetric and asymmetric games. The performance of this social learning framework is extensively evaluated under the testbed of two-player general-sum games comparing with previous work [Hao and Leung 2011; Matlock and Sen 2007]. The influences of different factors on the learning performance of the social learning framework are investigated as well.
在多智能体系统中,社会最优性是实现系统全局效率最大化的理想目标。我们研究了智能体群体中社会最优结果的协调问题,其中每个智能体每轮随机与群体中的另一个智能体相互作用。以前的工作[Hales and Edmonds 2003;Matlock and Sen 2007, 2009]主要是将交互协议从随机交互修改为基于标签的交互,并且只关注对称博弈的情况。此外,在以往的工作中,智能体的决策过程通常是基于进化学习的,这通常会导致高通信成本和高协调率偏差。为了解决这些问题,我们提出了一个替代的社会学习框架,主要贡献如下:首先,我们引入了观察机制,以减少代理之间所需的通信量。其次,我们提出智能体的学习策略应该基于强化学习技术而不是进化学习。每个智能体显式地在其学习策略中保存其当前状态的记录,并独立地学习每个状态的最优策略。这样,学习性能更加稳定,并且适合于对称和非对称博弈。与之前的研究相比[Hao and Leung 2011;Matlock and Sen 2007]。研究了不同因素对社会学习框架学习绩效的影响。
{"title":"Achieving Socially Optimal Outcomes in Multiagent Systems with Reinforcement Social Learning","authors":"Jianye Hao, Ho-fung Leung","doi":"10.1145/2517329","DOIUrl":"https://doi.org/10.1145/2517329","url":null,"abstract":"In multiagent systems, social optimality is a desirable goal to achieve in terms of maximizing the global efficiency of the system. We study the problem of coordinating on socially optimal outcomes among a population of agents, in which each agent randomly interacts with another agent from the population each round. Previous work [Hales and Edmonds 2003; Matlock and Sen 2007, 2009] mainly resorts to modifying the interaction protocol from random interaction to tag-based interactions and only focus on the case of symmetric games. Besides, in previous work the agents’ decision making processes are usually based on evolutionary learning, which usually results in high communication cost and high deviation on the coordination rate. To solve these problems, we propose an alternative social learning framework with two major contributions as follows. First, we introduce the observation mechanism to reduce the amount of communication required among agents. Second, we propose that the agents’ learning strategies should be based on reinforcement learning technique instead of evolutionary learning. Each agent explicitly keeps the record of its current state in its learning strategy, and learn its optimal policy for each state independently. In this way, the learning performance is much more stable and also it is suitable for both symmetric and asymmetric games. The performance of this social learning framework is extensively evaluated under the testbed of two-player general-sum games comparing with previous work [Hao and Leung 2011; Matlock and Sen 2007]. The influences of different factors on the learning performance of the social learning framework are investigated as well.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73504370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Performance Modeling and Optimization of Deadline-Driven Pig Programs 截止日期驱动的清管器项目性能建模与优化
IF 2.7 4区 计算机科学 Q2 Computer Science Pub Date : 2013-09-01 DOI: 10.1145/2518017.2518019
Zhuoyao Zhang, L. Cherkasova, Abhishek Verma, B. T. Loo
Many applications associated with live business intelligence are written as complex data analysis programs defined by directed acyclic graphs of MapReduce jobs, for example, using Pig, Hive, or Scope frameworks. An increasing number of these applications have additional requirements for completion time guarantees. In this article, we consider the popular Pig framework that provides a high-level SQL-like abstraction on top of MapReduce engine for processing large data sets. There is a lack of performance models and analysis tools for automated performance management of such MapReduce jobs. We offer a performance modeling environment for Pig programs that automatically profiles jobs from the past runs and aims to solve the following inter-related problems: (i) estimating the completion time of a Pig program as a function of allocated resources; (ii) estimating the amount of resources (a number of map and reduce slots) required for completing a Pig program with a given (soft) deadline. First, we design a basic performance model that accurately predicts completion time and required resource allocation for a Pig program that is defined as a sequence of MapReduce jobs: predicted completion times are within 10% of the measured ones. Second, we optimize a Pig program execution by enforcing the optimal schedule of its concurrent jobs. For DAGs with concurrent jobs, this optimization helps reducing the program completion time: 10%--27% in our experiments. Moreover, it eliminates possible nondeterminism of concurrent jobs’ execution in the Pig program, and therefore, enables a more accurate performance model for Pig programs. Third, based on these optimizations, we propose a refined performance model for Pig programs with concurrent jobs. The proposed approach leads to significant resource savings (20%--60% in our experiments) compared with the original, unoptimized solution. We validate our solution using a 66-node Hadoop cluster and a diverse set of workloads: PigMix benchmark, TPC-H queries, and customized queries mining a collection of HP Labs’ web proxy logs.
许多与实时商业智能相关的应用程序被编写为复杂的数据分析程序,由MapReduce作业的有向无环图定义,例如,使用Pig、Hive或Scope框架。越来越多的此类应用程序对完成时间保证有额外的要求。在本文中,我们考虑流行的Pig框架,它在MapReduce引擎之上提供类似sql的高级抽象,用于处理大型数据集。目前还缺乏对这类MapReduce作业进行自动化性能管理的性能模型和分析工具。我们为Pig程序提供了一个性能建模环境,可以自动分析过去运行的作业,旨在解决以下相互关联的问题:(i)估计Pig程序的完成时间作为分配资源的函数;(ii)估算在给定(软)截止日期内完成Pig程序所需的资源量(地图和减少槽的数量)。首先,我们设计了一个基本的性能模型,可以准确地预测一个Pig程序的完成时间和所需的资源分配,该程序被定义为一系列MapReduce作业:预测的完成时间在实际完成时间的10%以内。其次,我们通过执行并发作业的最佳调度来优化Pig程序的执行。对于具有并发作业的dag,此优化有助于减少程序完成时间:在我们的实验中减少了10%- 27%。此外,它消除了Pig程序中并发作业执行的不确定性,因此可以为Pig程序提供更准确的性能模型。第三,基于这些优化,我们提出了具有并发作业的Pig程序的改进性能模型。与原始的、未优化的解决方案相比,所提出的方法可以显著节省资源(在我们的实验中为20%- 60%)。我们使用一个66节点的Hadoop集群和一组不同的工作负载来验证我们的解决方案:PigMix基准测试,TPC-H查询,以及挖掘HP实验室web代理日志集合的自定义查询。
{"title":"Performance Modeling and Optimization of Deadline-Driven Pig Programs","authors":"Zhuoyao Zhang, L. Cherkasova, Abhishek Verma, B. T. Loo","doi":"10.1145/2518017.2518019","DOIUrl":"https://doi.org/10.1145/2518017.2518019","url":null,"abstract":"Many applications associated with live business intelligence are written as complex data analysis programs defined by directed acyclic graphs of MapReduce jobs, for example, using Pig, Hive, or Scope frameworks. An increasing number of these applications have additional requirements for completion time guarantees. In this article, we consider the popular Pig framework that provides a high-level SQL-like abstraction on top of MapReduce engine for processing large data sets. There is a lack of performance models and analysis tools for automated performance management of such MapReduce jobs. We offer a performance modeling environment for Pig programs that automatically profiles jobs from the past runs and aims to solve the following inter-related problems: (i) estimating the completion time of a Pig program as a function of allocated resources; (ii) estimating the amount of resources (a number of map and reduce slots) required for completing a Pig program with a given (soft) deadline. First, we design a basic performance model that accurately predicts completion time and required resource allocation for a Pig program that is defined as a sequence of MapReduce jobs: predicted completion times are within 10% of the measured ones. Second, we optimize a Pig program execution by enforcing the optimal schedule of its concurrent jobs. For DAGs with concurrent jobs, this optimization helps reducing the program completion time: 10%--27% in our experiments. Moreover, it eliminates possible nondeterminism of concurrent jobs’ execution in the Pig program, and therefore, enables a more accurate performance model for Pig programs. Third, based on these optimizations, we propose a refined performance model for Pig programs with concurrent jobs. The proposed approach leads to significant resource savings (20%--60% in our experiments) compared with the original, unoptimized solution. We validate our solution using a 66-node Hadoop cluster and a diverse set of workloads: PigMix benchmark, TPC-H queries, and customized queries mining a collection of HP Labs’ web proxy logs.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86353960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Autonomic Provisioning with Self-Adaptive Neural Fuzzy Control for Percentile-Based Delay Guarantee 基于百分位延迟保证的自适应神经模糊自动供给
IF 2.7 4区 计算机科学 Q2 Computer Science Pub Date : 2013-07-01 DOI: 10.1145/2491465.2491468
P. Lama, Xiaobo Zhou
Autonomic server provisioning for performance assurance is a critical issue in Internet services. It is challenging to guarantee that requests flowing through a multi-tier system will experience an acceptable distribution of delays. The difficulty is mainly due to highly dynamic workloads, the complexity of underlying computer systems, and the lack of accurate performance models. We propose a novel autonomic server provisioning approach based on a model-independent self-adaptive Neural Fuzzy Control (NFC). Existing model-independent fuzzy controllers are designed manually on a trial-and-error basis, and are often ineffective in the face of highly dynamic workloads. NFC is a hybrid of control-theoretical and machine learning techniques. It is capable of self-constructing its structure and adapting its parameters through fast online learning. We further enhance NFC to compensate for the effect of server switching delays. Extensive simulations demonstrate that, compared to a rule-based fuzzy controller and a Proportional-Integral controller, the NFC-based approach delivers superior performance assurance in the face of highly dynamic workloads. It is robust to variation in workload intensity, characteristics, delay target, and server switching delays. We demonstrate the feasibility and performance of the NFC-based approach with a testbed implementation in virtualized blade servers hosting a multi-tier online auction benchmark.
为保证性能而自主提供服务器是Internet服务中的一个关键问题。保证流经多层系统的请求将经历可接受的延迟分布是具有挑战性的。困难主要是由于高度动态的工作负载、底层计算机系统的复杂性以及缺乏准确的性能模型。提出了一种基于模型无关自适应神经模糊控制(NFC)的服务器自主配置方法。现有的模型无关模糊控制器是在试错的基础上手工设计的,在面对高度动态的工作负载时往往是无效的。NFC是控制理论和机器学习技术的混合体。它能够通过快速在线学习自构建结构和自适应参数。我们进一步增强NFC以补偿服务器切换延迟的影响。大量的仿真表明,与基于规则的模糊控制器和比例积分控制器相比,基于nfc的方法在面对高动态工作负载时提供了更好的性能保证。它对工作负载强度、特征、延迟目标和服务器切换延迟的变化具有鲁棒性。我们通过在托管多层在线拍卖基准的虚拟化刀片服务器上的测试平台实现来演示基于nfc的方法的可行性和性能。
{"title":"Autonomic Provisioning with Self-Adaptive Neural Fuzzy Control for Percentile-Based Delay Guarantee","authors":"P. Lama, Xiaobo Zhou","doi":"10.1145/2491465.2491468","DOIUrl":"https://doi.org/10.1145/2491465.2491468","url":null,"abstract":"Autonomic server provisioning for performance assurance is a critical issue in Internet services. It is challenging to guarantee that requests flowing through a multi-tier system will experience an acceptable distribution of delays. The difficulty is mainly due to highly dynamic workloads, the complexity of underlying computer systems, and the lack of accurate performance models. We propose a novel autonomic server provisioning approach based on a model-independent self-adaptive Neural Fuzzy Control (NFC). Existing model-independent fuzzy controllers are designed manually on a trial-and-error basis, and are often ineffective in the face of highly dynamic workloads. NFC is a hybrid of control-theoretical and machine learning techniques. It is capable of self-constructing its structure and adapting its parameters through fast online learning. We further enhance NFC to compensate for the effect of server switching delays. Extensive simulations demonstrate that, compared to a rule-based fuzzy controller and a Proportional-Integral controller, the NFC-based approach delivers superior performance assurance in the face of highly dynamic workloads. It is robust to variation in workload intensity, characteristics, delay target, and server switching delays. We demonstrate the feasibility and performance of the NFC-based approach with a testbed implementation in virtualized blade servers hosting a multi-tier online auction benchmark.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81371186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Adaptive Composition of Distributed Pervasive Applications in Heterogeneous Environments 异构环境中分布式普适应用的自适应组合
IF 2.7 4区 计算机科学 Q2 Computer Science Pub Date : 2013-07-01 DOI: 10.1145/2491465.2491469
S. Schuhmann, K. Herrmann, K. Rothermel, Yazan Boshmaf
Complex pervasive applications need to be distributed for two main reasons: due to the typical resource restrictions of mobile devices, and to use local services to interact with the immediate environment. To set up such an application, the distributed components require spontaneous composition. Since dynamics in the environment and device failures may imply the unavailability of components and devices at any time, finding, maintaining, and adapting such a composition is a nontrivial task. Moreover, the speed of such a configuration process directly influences the user since in the event of a configuration, the user has to wait. In this article, we introduce configuration algorithms for homogeneous and heterogeneous environments. We discuss a comprehensive approach to pervasive application configuration that adapts to the characteristics of the environment: It chooses the most efficient configuration method for the given environment to minimize the configuration latency. Moreover, we propose a new scheme for caching and reusing partial application configurations. This scheme reduces the configuration latency even further such that a configuration can be executed without notable disturbance of the user.
需要分发复杂的普及应用程序有两个主要原因:由于移动设备的典型资源限制,以及使用本地服务与直接环境进行交互。要建立这样的应用程序,分布式组件需要自发组合。由于环境中的动态和设备故障可能意味着组件和设备在任何时候都不可用,因此查找、维护和调整这样的组合是一项非常重要的任务。此外,这种配置过程的速度直接影响到用户,因为在配置的情况下,用户必须等待。在本文中,我们将介绍同构和异构环境的配置算法。我们讨论了一种适应环境特征的普及应用程序配置的综合方法:它为给定环境选择最有效的配置方法,以最大限度地减少配置延迟。此外,我们还提出了一种缓存和重用部分应用程序配置的新方案。该方案进一步减少了配置延迟,从而可以在不明显干扰用户的情况下执行配置。
{"title":"Adaptive Composition of Distributed Pervasive Applications in Heterogeneous Environments","authors":"S. Schuhmann, K. Herrmann, K. Rothermel, Yazan Boshmaf","doi":"10.1145/2491465.2491469","DOIUrl":"https://doi.org/10.1145/2491465.2491469","url":null,"abstract":"Complex pervasive applications need to be distributed for two main reasons: due to the typical resource restrictions of mobile devices, and to use local services to interact with the immediate environment. To set up such an application, the distributed components require spontaneous composition. Since dynamics in the environment and device failures may imply the unavailability of components and devices at any time, finding, maintaining, and adapting such a composition is a nontrivial task. Moreover, the speed of such a configuration process directly influences the user since in the event of a configuration, the user has to wait. In this article, we introduce configuration algorithms for homogeneous and heterogeneous environments. We discuss a comprehensive approach to pervasive application configuration that adapts to the characteristics of the environment: It chooses the most efficient configuration method for the given environment to minimize the configuration latency. Moreover, we propose a new scheme for caching and reusing partial application configurations. This scheme reduces the configuration latency even further such that a configuration can be executed without notable disturbance of the user.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86101857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
ACM Transactions on Autonomous and Adaptive Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1