Online Offloading in Dense Wireless Networks: An Adversary Multi-armed Bandit Approach

被引:0
|
作者
Hua, Cunqing [1 ]
Wang, Lingzhi [1 ]
Gu, Pengwenlong [2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Cyberspace Secur, Shanghai 200240, Peoples R China
[2] Univ Paris Saclay, TELECOM ParisTech, LTCI, F-75013 Paris, France
基金
国家高技术研究发展计划(863计划);
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider the offloading problem in the dense wireless networks, whereby each user adaptively assigns its flows to different neighboring access points to maximize the utility. We assume that the channel state information is unknown to the users, which raises two challenging issues. Firstly, the performance achieved from each access point is unknown and has to be learned sequentially due to dynamic channel condition. Secondly, the achieved performance also depends on the set of competing flows, which is unpredictable since the decisions of other users are made online. We formulate this problem as an online learning problem based on the adversarial multi-armed bandit framework, which accommodates both the arbitrary variation of channel condition and the unpredictable competition among flows. An online offloading algorithm is presented based on an exponentially weighted average strategy, which is shown to converge to a set of correlated equilibria with vanishing regrets through theoretical analysis and simulations.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Multi-armed Bandit Algorithm for Online Offloading and Scheduling in Edge Computing Environment
    Han, Xiaoying
    Xu, Xiaohua
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 81 - 87
  • [2] A Multi-Armed Bandit Approach to Wireless Information and Power Transfer
    Xing, Yuan
    Qian, Yuchen
    Dong, Liang
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (04) : 886 - 889
  • [3] A Multi-armed Bandit Approach to Online Spatial Task Assignment
    Hassan, Umair ul
    Curry, Edward
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 212 - 219
  • [4] A multi-armed bandit approach for exploring partially observed networks
    Kaushalya Madhawa
    Tsuyoshi Murata
    Applied Network Science, 4
  • [5] A multi-armed bandit approach for exploring partially observed networks
    Madhawa, Kaushalya
    Murata, Tsuyoshi
    APPLIED NETWORK SCIENCE, 2019, 4 (01)
  • [6] Multi-armed Bandit Optimization of Cache Content in Wireless Infostation Networks
    Blasco, Pol
    Guenduez, Deniz
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 51 - 55
  • [7] FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks
    Emilie, Bout
    Alessandro, Brighente
    Conti, Mauro
    Loscri, Valeria
    arXiv, 2022,
  • [8] FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks
    Bout, Emilie
    Brighente, Alessandro
    Conti, Mauro
    Valeria, Loscri
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [9] Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach
    Wang, Xiong
    Ye, Jiancheng
    Lui, John C. S.
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, : 1199 - 1208
  • [10] Multi-User Communication Networks: A Coordinated Multi-Armed Bandit Approach
    Avner, Orly
    Mannor, Shie
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (06) : 2192 - 2207