4.5 Article

Edge Computing in the Dark: Leveraging Contextual-Combinatorial Bandit and Coded Computing

Journal

IEEE-ACM TRANSACTIONS ON NETWORKING
Volume 29, Issue 3, Pages 1022-1031

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNET.2021.3058685

Keywords

Edge computing; Computational modeling; Task analysis; Processor scheduling; Context modeling; IEEE transactions; Encoding; Edge computing; coded computing; online learning; multi-armed bandits

Funding

  1. Defense Advanced Research Projects Agency (DARPA) [HR001117C0053]
  2. Army Research Office (ARO) [W911NF1810400]
  3. NSF [CCF-1703575, CCF-1763673, CNS-2003035, CNS-2002874]
  4. Office of Naval Research (ONR) [N00014-16-1-2189]
  5. UC Office of President [LFR-18-548175]
  6. Intel
  7. U.S. Department of Defense (DOD) [W911NF1810400] Funding Source: U.S. Department of Defense (DOD)

Ask authors/readers for more resources

This paper investigates computation offloading over unknown edge cloud networks, proposing an online coded edge computing policy to maximize cumulative expected reward in an asymptotically-optimal manner. Numerical studies show that this policy significantly outperforms other benchmarks in terms of cumulative reward.
With recent advancements in edge computing capabilities, there has been a significant increase in utilizing the edge cloud for event-driven and time-sensitive computations. However, large-scale edge computing networks can suffer substantially from unpredictable and unreliable computing resources which can result in high variability of service quality. We consider the problem of computation offloading over unknown edge cloud networks with a sequence of timely computation jobs. Motivated by the MapReduce computation paradigm, we assume that each computation job can be partitioned to smaller Map functions which are processed at the edge, and the Reduce function is computed at the user after the Map results are collected from the edge nodes. We model the service quality of each edge device as function of context. The user decides the computations to offload to each device with the goal of receiving a recoverable set of computation results in the given deadline. By leveraging the coded computing framework in order to tackle failures or stragglers in computation, we formulate this problem using contextual-combinatorial multi-armed bandits (CC-MAB), and aim to maximize the cumulative expected reward. We propose an online learning policy called online coded edge computing policy, which provably achieves asymptotically-optimal performance in terms of regret loss compared with the optimal offline policy for the proposed CC-MAB problem. In terms of the cumulative reward, it is shown that the online coded edge computing policy significantly outperforms other benchmarks via numerical studies.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available