4.5 Article

Edge Computing in the Dark: Leveraging Contextual-Combinatorial Bandit and Coded Computing

期刊

IEEE-ACM TRANSACTIONS ON NETWORKING
卷 29, 期 3, 页码 1022-1031

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNET.2021.3058685

关键词

Edge computing; Computational modeling; Task analysis; Processor scheduling; Context modeling; IEEE transactions; Encoding; Edge computing; coded computing; online learning; multi-armed bandits

资金

  1. Defense Advanced Research Projects Agency (DARPA) [HR001117C0053]
  2. Army Research Office (ARO) [W911NF1810400]
  3. NSF [CCF-1703575, CCF-1763673, CNS-2003035, CNS-2002874]
  4. Office of Naval Research (ONR) [N00014-16-1-2189]
  5. UC Office of President [LFR-18-548175]
  6. Intel
  7. U.S. Department of Defense (DOD) [W911NF1810400] Funding Source: U.S. Department of Defense (DOD)

向作者/读者索取更多资源

This paper investigates computation offloading over unknown edge cloud networks, proposing an online coded edge computing policy to maximize cumulative expected reward in an asymptotically-optimal manner. Numerical studies show that this policy significantly outperforms other benchmarks in terms of cumulative reward.
With recent advancements in edge computing capabilities, there has been a significant increase in utilizing the edge cloud for event-driven and time-sensitive computations. However, large-scale edge computing networks can suffer substantially from unpredictable and unreliable computing resources which can result in high variability of service quality. We consider the problem of computation offloading over unknown edge cloud networks with a sequence of timely computation jobs. Motivated by the MapReduce computation paradigm, we assume that each computation job can be partitioned to smaller Map functions which are processed at the edge, and the Reduce function is computed at the user after the Map results are collected from the edge nodes. We model the service quality of each edge device as function of context. The user decides the computations to offload to each device with the goal of receiving a recoverable set of computation results in the given deadline. By leveraging the coded computing framework in order to tackle failures or stragglers in computation, we formulate this problem using contextual-combinatorial multi-armed bandits (CC-MAB), and aim to maximize the cumulative expected reward. We propose an online learning policy called online coded edge computing policy, which provably achieves asymptotically-optimal performance in terms of regret loss compared with the optimal offline policy for the proposed CC-MAB problem. In terms of the cumulative reward, it is shown that the online coded edge computing policy significantly outperforms other benchmarks via numerical studies.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据