Comparison of multi-armed bandit algorithms for content request routing in cache-enabled networks

被引:0
|
作者
Nii, Yusuke [1 ]
Tayuki, Ippei [1 ]
Hirata, Kouji [1 ]
机构
[1] Kansai Univ, Fac Engn Sci, Osaka 5648680, Japan
关键词
D O I
10.1109/ICCE-Taiwan62264.2024.10674247
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In cache-enabled networks, contents are cached in intermediate routers to be downloaded by clients. In the past, a multi-armed bandit (MAB) problem-based routing (named MAB-routing) has been proposed in order to efficiently utilize the cached contents. In the MAB-routing, each intermediate router forwards an arrival content request to an appropriate output port based on an MAB algorithm, regarding output ports as arms. By doing so, the MAB-routing becomes increasingly likely to find the corresponding content cached in a router. In this paper, we examine how MAB algorithms affect the performance of the MAB-routing. There exist several MAB algorithms such as epsilon-greedy, Upper Confidence Bound, and Thompson Sampling. Through simulation experiments, we show the performance of the MAB-routing with each algorithm.
引用
收藏
页码:757 / 758
页数:2
相关论文
共 50 条
  • [1] Multi-armed Bandit Optimization of Cache Content in Wireless Infostation Networks
    Blasco, Pol
    Guenduez, Deniz
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 51 - 55
  • [2] Multi-Armed Bandit Learning for Cache Content Placement in Vehicular Social Networks
    Bitaghsir, Saeid Akhavan
    Dadlani, Aresh
    Borhani, Muhammad
    Khonsari, Ahmad
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (12) : 2321 - 2324
  • [3] Scaling Multi-Armed Bandit Algorithms
    Fouche, Edouard
    Komiyama, Junpei
    Boehm, Klemens
    KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2019, : 1449 - 1459
  • [4] Multi-armed bandit algorithms and empirical evaluation
    Vermorel, J
    Mohri, M
    MACHINE LEARNING: ECML 2005, PROCEEDINGS, 2005, 3720 : 437 - 448
  • [5] Anytime Algorithms for Multi-Armed Bandit Problems
    Kleinberg, Robert
    PROCEEDINGS OF THE SEVENTHEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2006, : 928 - 936
  • [6] MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors
    Gohil, Vasudev
    Kande, Rahul
    Chen, Chen
    Sadeghi, Ahmad-Reza
    Rajendran, Jeyavijayan
    2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,
  • [7] Fair Link Prediction with Multi-Armed Bandit Algorithms
    Wang, Weixiang
    Soundarajan, Sucheta
    PROCEEDINGS OF THE 15TH ACM WEB SCIENCE CONFERENCE, WEBSCI 2023, 2023, : 219 - 228
  • [8] Multi-armed Bandit Algorithms for Adaptive Learning: A Survey
    Mui, John
    Lin, Fuhua
    Dewan, M. Ali Akber
    ARTIFICIAL INTELLIGENCE IN EDUCATION (AIED 2021), PT II, 2021, 12749 : 273 - 278
  • [9] Online Optimization Algorithms for Multi-Armed Bandit Problem
    Kamalov, Mikhail
    Dobrynin, Vladimir
    Balykina, Yulia
    2017 CONSTRUCTIVE NONSMOOTH ANALYSIS AND RELATED TOPICS (DEDICATED TO THE MEMORY OF V.F. DEMYANOV) (CNSA), 2017, : 141 - 143
  • [10] Multi-agent Multi-armed Bandit Learning for Content Caching in Edge Networks
    Su, Lina
    Zhou, Ruiting
    Wang, Ne
    Chen, Junmei
    Li, Zongpeng
    2022 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (IEEE ICWS 2022), 2022, : 11 - 16