Comparison of multi-armed bandit algorithms for content request routing in cache-enabled networks

被引:0
|
作者
Nii, Yusuke [1 ]
Tayuki, Ippei [1 ]
Hirata, Kouji [1 ]
机构
[1] Kansai Univ, Fac Engn Sci, Osaka 5648680, Japan
关键词
D O I
10.1109/ICCE-Taiwan62264.2024.10674247
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In cache-enabled networks, contents are cached in intermediate routers to be downloaded by clients. In the past, a multi-armed bandit (MAB) problem-based routing (named MAB-routing) has been proposed in order to efficiently utilize the cached contents. In the MAB-routing, each intermediate router forwards an arrival content request to an appropriate output port based on an MAB algorithm, regarding output ports as arms. By doing so, the MAB-routing becomes increasingly likely to find the corresponding content cached in a router. In this paper, we examine how MAB algorithms affect the performance of the MAB-routing. There exist several MAB algorithms such as epsilon-greedy, Upper Confidence Bound, and Thompson Sampling. Through simulation experiments, we show the performance of the MAB-routing with each algorithm.
引用
收藏
页码:757 / 758
页数:2
相关论文
共 50 条
  • [41] Multiagent Multi-Armed Bandit Schemes for Gateway Selection in UAV Networks
    Hashima, Sherief
    Hatano, Kohei
    Mohamed, Ehab Mahmoud
    2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2020,
  • [42] Active Learning on Heterogeneous Information Networks: A Multi-armed Bandit Approach
    Xin, Doris
    El-Kishky, Ahmed
    Liao, De
    Norick, Brandon
    Han, Jiawei
    2018 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2018, : 1350 - 1355
  • [43] A Multi-armed Bandit Approach to Distributed Robust Beamforming in Multicell Networks
    Zhang, Xinruo
    Nakhai, Mohammad Reza
    Ariffin, Wan Nur Suryani Firuz Wan
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [44] FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks
    Emilie, Bout
    Alessandro, Brighente
    Conti, Mauro
    Loscri, Valeria
    arXiv, 2022,
  • [45] Multi-Armed Bandit Framework for Resource Allocation in Uplink NOMA Networks
    Benamor, Amani
    Habachi, Oussama
    Kammoun, Ines
    Cances, Jean-Pierre
    2023 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC, 2023,
  • [46] Multi-Armed Bandit in Action: Optimizing Performance in Dynamic Hybrid Networks
    Henri, Sebastien
    Vlachou, Christina
    Thiran, Patrick
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (04) : 1879 - 1892
  • [47] FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks
    Bout, Emilie
    Brighente, Alessandro
    Conti, Mauro
    Valeria, Loscri
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [48] POMDP multi-armed bandit formulation for energy minimization in sensor networks
    Krishnamurthy, V
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 793 - 796
  • [49] QoE Analysis in Cache-Enabled Multi-UAV Networks
    Bera, Abhishek
    Misra, Sudip
    Chatterjee, Chandranath
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 6680 - 6687
  • [50] Gorthaur : A Portfolio Approach for Dynamic Selection of Multi-Armed Bandit Algorithms for Recommendation
    Gutowski, Nicolas
    Amghar, Tassadit
    Camp, Olivier
    Chhel, Fabien
    2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019), 2019, : 1164 - 1171