Online Offloading in Dense Wireless Networks: An Adversary Multi-armed Bandit Approach

被引:0
|
作者
Hua, Cunqing [1 ]
Wang, Lingzhi [1 ]
Gu, Pengwenlong [2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Cyberspace Secur, Shanghai 200240, Peoples R China
[2] Univ Paris Saclay, TELECOM ParisTech, LTCI, F-75013 Paris, France
来源
2018 10TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP) | 2018年
基金
国家高技术研究发展计划(863计划);
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider the offloading problem in the dense wireless networks, whereby each user adaptively assigns its flows to different neighboring access points to maximize the utility. We assume that the channel state information is unknown to the users, which raises two challenging issues. Firstly, the performance achieved from each access point is unknown and has to be learned sequentially due to dynamic channel condition. Secondly, the achieved performance also depends on the set of competing flows, which is unpredictable since the decisions of other users are made online. We formulate this problem as an online learning problem based on the adversarial multi-armed bandit framework, which accommodates both the arbitrary variation of channel condition and the unpredictable competition among flows. An online offloading algorithm is presented based on an exponentially weighted average strategy, which is shown to converge to a set of correlated equilibria with vanishing regrets through theoretical analysis and simulations.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Multi-armed bandit games
    Gursoy, Kemal
    ANNALS OF OPERATIONS RESEARCH, 2024,
  • [22] Optimal Handover Policy for mmWave Cellular Networks: A Multi-Armed Bandit Approach
    Sun, Li
    Hou, Jing
    Shu, Tao
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [23] Using Multi-Armed Bandit Learning for Thwarting MAC Layer Attacks in Wireless Networks
    Dutta, Hrishikesh
    Bhuyan, Amit Kumar
    Biswas, Subir
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024,
  • [24] Adaptive Modulation in Underwater acouStic nEtworks (AMUSE): a Multi-Armed Bandit approach
    Busacca, F.
    Galluccio, L.
    Palazzo, S.
    Panebianco, A.
    Raftopoulos, R.
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 2336 - 2341
  • [25] Multiuser Scheduling in Centralized Cognitive Radio Networks: A Multi-Armed Bandit Approach
    Alipour-Fanid, Amir
    Dabaghchian, Monireh
    Arora, Raman
    Zeng, Kai
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (02) : 1074 - 1091
  • [26] muMAB: A Multi-Armed Bandit Model for Wireless Network Selection
    Boldrini, Stefano
    De Nardis, Luca
    Caso, Giuseppe
    Le, Mai T. P.
    Fiorina, Jocelyn
    Di Benedetto, Maria-Gabriella
    ALGORITHMS, 2018, 11 (02)
  • [27] A Contextual Multi-Armed Bandit approach for NDN forwarding
    Mordjana, Yakoub
    Djamaa, Badis
    Senouci, Mustapha Reda
    Herzallah, Aymen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 230
  • [28] A combinatorial multi-armed bandit approach to correlation clustering
    Gullo, F.
    Mandaglio, D.
    Tagarelli, A.
    DATA MINING AND KNOWLEDGE DISCOVERY, 2023, 37 (04) : 1630 - 1691
  • [29] Improving multi-armed bandit algorithms in online pricing settings
    Trovo, Francesco
    Paladino, Stefano
    Restelli, Marcello
    Gatti, Nicola
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2018, 98 : 196 - 235
  • [30] Repeated Dollar Auctions: A Multi-Armed Bandit Approach
    Waniek, Marcin
    Long Tran-Tranh
    Michalak, Tomasz
    AAMAS'16: PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2016, : 579 - 587