-
Feature and Parameter Selection in Stochastic Linear Bandits
Authors:
Ahmadreza Moradipari,
Berkay Turan,
Yasin Abbasi-Yadkori,
Mahnoosh Alizadeh,
Mohammad Ghavamzadeh
Abstract:
We study two model selection settings in stochastic linear bandits (LB). In the first setting, which we refer to as feature selection, the expected reward of the LB problem is in the linear span of at least one of $M$ feature maps (models). In the second setting, the reward parameter of the LB problem is arbitrarily selected from $M$ models represented as (possibly) overlap** balls in…
▽ More
We study two model selection settings in stochastic linear bandits (LB). In the first setting, which we refer to as feature selection, the expected reward of the LB problem is in the linear span of at least one of $M$ feature maps (models). In the second setting, the reward parameter of the LB problem is arbitrarily selected from $M$ models represented as (possibly) overlap** balls in $\mathbb R^d$. However, the agent only has access to misspecified models, i.e.,~estimates of the centers and radii of the balls. We refer to this setting as parameter selection. For each setting, we develop and analyze a computationally efficient algorithm that is based on a reduction from bandits to full-information problems. This allows us to obtain regret bounds that are not worse (up to a $\sqrt{\log M}$ factor) than the case where the true model is known. This is the best-reported dependence on the number of models $M$ in these settings. Finally, we empirically show the effectiveness of our algorithms using synthetic and real-world experiments.
△ Less
Submitted 17 June, 2022; v1 submitted 9 June, 2021;
originally announced June 2021.
-
Throughput-Fairness Tradeoffs in Mobility Platforms
Authors:
Arjun Balasingam,
Karthik Gopalakrishnan,
Radhika Mittal,
Venkat Arun,
Ahmed Saeed,
Mohammad Alizadeh,
Hamsa Balakrishnan,
Hari Balakrishnan
Abstract:
This paper studies the problem of allocating tasks from different customers to vehicles in mobility platforms, which are used for applications like food and package delivery, ridesharing, and mobile sensing. A mobility platform should allocate tasks to vehicles and schedule them in order to optimize both throughput and fairness across customers. However, existing approaches to scheduling tasks in…
▽ More
This paper studies the problem of allocating tasks from different customers to vehicles in mobility platforms, which are used for applications like food and package delivery, ridesharing, and mobile sensing. A mobility platform should allocate tasks to vehicles and schedule them in order to optimize both throughput and fairness across customers. However, existing approaches to scheduling tasks in mobility platforms ignore fairness.
We introduce Mobius, a system that uses guided optimization to achieve both high throughput and fairness across customers. Mobius supports spatiotemporally diverse and dynamic customer demands. It provides a principled method to navigate inherent tradeoffs between fairness and throughput caused by shared mobility. Our evaluation demonstrates these properties, along with the versatility and scalability of Mobius, using traces gathered from ridesharing and aerial sensing applications. Our ridesharing case study shows that Mobius can schedule more than 16,000 tasks across 40 customers and 200 vehicles in an online manner.
△ Less
Submitted 25 May, 2021;
originally announced May 2021.
-
Envisioning security control in renewable dominated power systems through stochastic multi-period AC security constrained optimal power flow
Authors:
Mohammad Iman Alizadeh,
Muhammad Usman,
Florin Capitanescu
Abstract:
The accelerated penetration rate of renewable energy sources (RES) brings environmental benefits at the expense of increasing operation cost and undermining the satisfaction of the N-1 security criterion. To address the latter issue, this paper envisions N-1 security control in RES dominated power systems through stochastic multi-period AC security constrained optimal power flow (SCOPF). The paper…
▽ More
The accelerated penetration rate of renewable energy sources (RES) brings environmental benefits at the expense of increasing operation cost and undermining the satisfaction of the N-1 security criterion. To address the latter issue, this paper envisions N-1 security control in RES dominated power systems through stochastic multi-period AC security constrained optimal power flow (SCOPF). The paper extends the state-of-the-art, i.e. deterministic and single time period AC SCOPF, to capture two new dimensions, RES stochasticity and multiple time periods, as well as emerging sources of flexibility such as flexible loads (FL) and energy storage systems (ESS). Accordingly, the paper proposes and solves for the first time a new problem formulation in the form of stochastic multi-period AC SCOPF (S-MP-SCOPF). The S-MP-SCOPF is formulated as a non-linear programming (NLP) problem. It computes optimal setpoints of flexibility resources and other conventional control means for congestion management and voltage control in day-ahead operation. Another salient feature of this paper is the comprehensive and accurate modelling, using: AC power flow model for both pre-contingency and post-contingency states, inter-temporal constraints for resources such as FL and ESS in a 24-hours time horizon and RES uncertainties. The importance and performances of the proposed model through a direct approach, pushing the problem size up to the solver limit, are illustrated on two test systems of 5 nodes and 60 nodes, respectively, while future work will develop a tractable algorithm.
△ Less
Submitted 18 June, 2021; v1 submitted 30 April, 2021;
originally announced April 2021.
-
Efficient Video Compression via Content-Adaptive Super-Resolution
Authors:
Mehrdad Khani,
Vibhaalakshmi Sivaraman,
Mohammad Alizadeh
Abstract:
Video compression is a critical component of Internet video delivery. Recent work has shown that deep learning techniques can rival or outperform human-designed algorithms, but these methods are significantly less compute and power-efficient than existing codecs. This paper presents a new approach that augments existing codecs with a small, content-adaptive super-resolution model that significantl…
▽ More
Video compression is a critical component of Internet video delivery. Recent work has shown that deep learning techniques can rival or outperform human-designed algorithms, but these methods are significantly less compute and power-efficient than existing codecs. This paper presents a new approach that augments existing codecs with a small, content-adaptive super-resolution model that significantly boosts video quality. Our method, SRVC, encodes video into two bitstreams: (i) a content stream, produced by compressing downsampled low-resolution video with the existing codec, (ii) a model stream, which encodes periodic updates to a lightweight super-resolution neural network customized for short segments of the video. SRVC decodes the video by passing the decompressed low-resolution video frames through the (time-varying) super-resolution model to reconstruct high-resolution video frames. Our results show that to achieve the same PSNR, SRVC requires 16% of the bits-per-pixel of H.265 in slow mode, and 2% of the bits-per-pixel of DVC, a recent deep learning-based video compression scheme. SRVC runs at 90 frames per second on a NVIDIA V100 GPU.
△ Less
Submitted 6 April, 2021;
originally announced April 2021.
-
The Division of Assets in Multiagent Systems: A Case Study in Team Blotto Games
Authors:
Keith Paarporn,
Rahul Chandan,
Mahnoosh Alizadeh,
Jason R. Marden
Abstract:
Multi-agent systems are designed to concurrently accomplish a diverse set of tasks at unprecedented scale. Here, the central problems faced by a system operator are to decide (i) how to divide available resources amongst the agents assigned to tasks and (ii) how to coordinate the behavior of the agents to optimize the efficiency of the resulting collective behavior. The focus of this paper is on p…
▽ More
Multi-agent systems are designed to concurrently accomplish a diverse set of tasks at unprecedented scale. Here, the central problems faced by a system operator are to decide (i) how to divide available resources amongst the agents assigned to tasks and (ii) how to coordinate the behavior of the agents to optimize the efficiency of the resulting collective behavior. The focus of this paper is on problem (i), where we seek to characterize the impact of the division of resources on the best-case efficiency of the resulting collective behavior. Specifically, we focus on a team Colonel Blotto game where there are two sub-colonels competing against a common adversary in a two battlefield environment. Here, each sub-colonel is assigned a given resource budget and is required to allocate these resources independent of the other sub-colonel. However, their success is dependent on the allocation strategy of both sub-colonels. The central focus of this manuscript is on how to divide a common pool of resources among the two sub-colonels to optimize the resulting best-case efficiency guarantees. Intuitively, one would imagine that the more balanced the division of resources, the worse the performance, as such divisions restrict the sub-colonels' ability to employ joint randomized strategies that tend to be necessary for optimizing performance guarantees. However, the main result of this paper demonstrates that this intuition is actually incorrect. A more balanced division of resources can offer better performance guarantees than a more centralized division. Hence, this paper demonstrates that the resource division problem is highly non-trivial in such enmeshed environments and worthy of significant future research efforts.
△ Less
Submitted 30 March, 2021;
originally announced March 2021.
-
Deep Unsupervised Learning for Generalized Assignment Problems: A Case-Study of User-Association in Wireless Networks
Authors:
Arjun Kaushik,
Mehrazin Alizadeh,
Omer Waqar,
Hina Tabassum
Abstract:
There exists many resource allocation problems in the field of wireless communications which can be formulated as the generalized assignment problems (GAP). GAP is a generic form of linear sum assignment problem (LSAP) and is more challenging to solve owing to the presence of both equality and inequality constraints. We propose a novel deep unsupervised learning (DUL) approach to solve GAP in a ti…
▽ More
There exists many resource allocation problems in the field of wireless communications which can be formulated as the generalized assignment problems (GAP). GAP is a generic form of linear sum assignment problem (LSAP) and is more challenging to solve owing to the presence of both equality and inequality constraints. We propose a novel deep unsupervised learning (DUL) approach to solve GAP in a time-efficient manner. More specifically, we propose a new approach that facilitates to train a deep neural network (DNN) using a customized loss function. This customized loss function constitutes the objective function and penalty terms corresponding to both equality and inequality constraints. Furthermore, we propose to employ a Softmax activation function at the output of DNN along with tensor splitting which simplifies the customized loss function and guarantees to meet the equality constraint. As a case-study, we consider a typical user-association problem in a wireless network, formulate it as GAP, and consequently solve it using our proposed DUL approach. Numerical results demonstrate that the proposed DUL approach provides near-optimal results with significantly lower time-complexity.
△ Less
Submitted 26 March, 2021;
originally announced March 2021.
-
TagMe: GPS-Assisted Automatic Object Annotation in Videos
Authors:
Songtao He,
Favyen Bastani,
Mohammad Alizadeh,
Hari Balakrishnan,
Michael Cafarella,
Tim Kraska,
Sam Madden
Abstract:
Training high-accuracy object detection models requires large and diverse annotated datasets. However, creating these data-sets is time-consuming and expensive since it relies on human annotators. We design, implement, and evaluate TagMe, a new approach for automatic object annotation in videos that uses GPS data. When the GPS trace of an object is available, TagMe matches the object's motion from…
▽ More
Training high-accuracy object detection models requires large and diverse annotated datasets. However, creating these data-sets is time-consuming and expensive since it relies on human annotators. We design, implement, and evaluate TagMe, a new approach for automatic object annotation in videos that uses GPS data. When the GPS trace of an object is available, TagMe matches the object's motion from GPS trace and the pixels' motions in the video to find the pixels belonging to the object in the video and creates the bounding box annotations of the object. TagMe works using passive data collection and can continuously generate new object annotations from outdoor video streams without any human annotators. We evaluate TagMe on a dataset of 100 video clips. We show TagMe can produce high-quality object annotations in a fully-automatic and low-cost way. Compared with the traditional human-in-the-loop solution, TagMe can produce the same amount of annotations at a much lower cost, e.g., up to 110x.
△ Less
Submitted 24 March, 2021;
originally announced March 2021.
-
The Effect of Network Topology on Credit Network Throughput
Authors:
Vibhaalakshmi Sivaraman,
Weizhao Tang,
Shaileshh Bojja Venkatakrishnan,
Giulia Fanti,
Mohammad Alizadeh
Abstract:
Credit networks rely on decentralized, pairwise trust relationships (channels) to exchange money or goods. Credit networks arise naturally in many financial systems, including the recent construct of payment channel networks in blockchain systems. An important performance metric for these networks is their transaction throughput. However, predicting the throughput of a credit network is nontrivial…
▽ More
Credit networks rely on decentralized, pairwise trust relationships (channels) to exchange money or goods. Credit networks arise naturally in many financial systems, including the recent construct of payment channel networks in blockchain systems. An important performance metric for these networks is their transaction throughput. However, predicting the throughput of a credit network is nontrivial. Unlike traditional communication channels, credit channels can become imbalanced; they are unable to support more transactions in a given direction once the credit limit has been reached. This potential for imbalance creates a complex dependency between a network's throughput and its topology, path choices, and the credit balances (state) on every channel. Even worse, certain combinations of these factors can lead the credit network to deadlocked states where no transactions can make progress. In this paper, we study the relationship between the throughput of a credit network and its topology and credit state. We show that the presence of deadlocks completely characterizes a network's throughput sensitivity to different credit states. Although we show that identifying deadlocks in an arbitrary topology is NP-hard, we propose a peeling algorithm inspired by decoding algorithms for erasure codes that upper bounds the severity of the deadlock. We use the peeling algorithm as a tool to compare the performance of different topologies as well as to aid in the synthesis of topologies robust to deadlocks.
△ Less
Submitted 28 September, 2021; v1 submitted 4 March, 2021;
originally announced March 2021.
-
COIN: COmpression with Implicit Neural representations
Authors:
Emilien Dupont,
Adam Goliński,
Milad Alizadeh,
Yee Whye Teh,
Arnaud Doucet
Abstract:
We propose a new simple approach for image compression: instead of storing the RGB values for each pixel of an image, we store the weights of a neural network overfitted to the image. Specifically, to encode an image, we fit it with an MLP which maps pixel locations to RGB values. We then quantize and store the weights of this MLP as a code for the image. To decode the image, we simply evaluate th…
▽ More
We propose a new simple approach for image compression: instead of storing the RGB values for each pixel of an image, we store the weights of a neural network overfitted to the image. Specifically, to encode an image, we fit it with an MLP which maps pixel locations to RGB values. We then quantize and store the weights of this MLP as a code for the image. To decode the image, we simply evaluate the MLP at every pixel location. We found that this simple approach outperforms JPEG at low bit-rates, even without entropy coding or learning a distribution over weights. While our framework is not yet competitive with state of the art compression methods, we show that it has various attractive properties which could make it a viable alternative to other neural data compression approaches.
△ Less
Submitted 10 April, 2021; v1 submitted 3 March, 2021;
originally announced March 2021.
-
SWP: Microsecond Network SLOs Without Priorities
Authors:
Kevin Zhao,
Prateesh Goyal,
Mohammad Alizadeh,
Thomas E. Anderson
Abstract:
The increasing use of cloud computing for latency-sensitive applications has sparked renewed interest in providing tight bounds on network tail latency. Achieving this in practice at reasonable network utilization has proved elusive, due to a combination of highly bursty application demand, faster link speeds, and heavy-tailed message sizes. While priority scheduling can be used to reduce tail lat…
▽ More
The increasing use of cloud computing for latency-sensitive applications has sparked renewed interest in providing tight bounds on network tail latency. Achieving this in practice at reasonable network utilization has proved elusive, due to a combination of highly bursty application demand, faster link speeds, and heavy-tailed message sizes. While priority scheduling can be used to reduce tail latency for some traffic, this comes at a cost of much worse delay behavior for all other traffic on the network. Most operators choose to run their networks at very low average utilization, despite the added cost, and yet still suffer poor tail behavior.
This paper takes a different approach. We build a system, swp, to help operators (and network designers) to understand and control tail latency without relying on priority scheduling. As network workload changes, swp is designed to give real-time advice on the network switch configurations needed to maintain tail latency objectives for each traffic class. The core of swp is an efficient model for simulating the combined effect of traffic characteristics, end-to-end congestion control, and switch scheduling on service-level objectives (SLOs), along with an optimizer that adjusts switch-level scheduling weights assigned to each class. Using simulation across a diverse set of workloads with different SLOs, we show that to meet the same SLOs as swp provides, FIFO would require 65% greater link capacity, and 79% more for scenarios with tight SLOs on bursty traffic classes.
△ Less
Submitted 2 March, 2021; v1 submitted 1 March, 2021;
originally announced March 2021.
-
The Isaac Newton Telescope monitoring survey of Local Group dwarf galaxies -- IV. The star formation history of Andromeda VII derived from long period variable stars
Authors:
Mahdieh Navabi,
Elham Saremi,
Atefeh Javadi,
Majedeh Noori,
Jacco Th. van Loon,
Habib G. Khosroshahi,
Iain McDonald,
Mina Alizadeh,
Arash Danesh,
Ghassem Gozaliasl,
Alireza Molaeinezhad,
Tahere Parto,
Mojtaba Raouf
Abstract:
We have examined the star formation history (SFH) of Andromeda VII (And VII), the brightest and most massive dwarf spheroidal (dSph) satellite of the Andromeda galaxy (M 31). Although M 31 is surrounded by several dSph companions with old stellar populations and low metallicity, it has a metal-rich stellar halo with an age of 6$-$8 Gyr. This indicates that any evolutionary association between the…
▽ More
We have examined the star formation history (SFH) of Andromeda VII (And VII), the brightest and most massive dwarf spheroidal (dSph) satellite of the Andromeda galaxy (M 31). Although M 31 is surrounded by several dSph companions with old stellar populations and low metallicity, it has a metal-rich stellar halo with an age of 6$-$8 Gyr. This indicates that any evolutionary association between the stellar halo of M 31 and its dSph system is frail. Therefore, the question is whether And VII (a high-metallicity dSph located $\sim$220 kpc from M 31), can be associated with M 31's young, metal-rich halo. Here, we perform the first reconstruction of the SFH of And VII employing long-period variable (LPV) stars. As the most-evolved asymptotic giant branch (AGB) and red supergiant (RSG) stars, the birth mass of LPVs can be determined by connecting their near-infrared photometry to theoretical evolutionary tracks. We found 55 LPV candidates within two half-light radii, using multi-epoch imaging with the Isaac Newton Telescope in the $i$ and $V$ bands. Based on their birth mass function, the star-formation rate (SFR) of And VII was obtained as a function of cosmic time. The main epoch of star formation occurred $\simeq 6.2$ Gyr ago with a SFR of $0.006\pm0.002$ M$_\odot$ yr$^{-1}$. Over the past 6 Gyr, we find slow star formation, which continued until 500 Myr ago with a SFR $\sim0.0005\pm0.0002$ M$_\odot$ yr$^{-1}$. We determined And VII's stellar mass $M=(13.3\pm5.3)\times10^6$ M$_\odot$ within a half-light radius $r_{\frac{1}{2}}=3.8\pm0.3$ arcmin and metallicity $Z=0.0007$, and also derived its distance modulus of $μ=24.38$ mag.
△ Less
Submitted 5 April, 2021; v1 submitted 25 January, 2021;
originally announced January 2021.
-
Flow-Loss: Learning Cardinality Estimates That Matter
Authors:
Parimarjan Negi,
Ryan Marcus,
Andreas Kipf,
Hongzi Mao,
Nesime Tatbul,
Tim Kraska,
Mohammad Alizadeh
Abstract:
Previous approaches to learned cardinality estimation have focused on improving average estimation error, but not all estimates matter equally. Since learned models inevitably make mistakes, the goal should be to improve the estimates that make the biggest difference to an optimizer. We introduce a new loss function, Flow-Loss, that explicitly optimizes for better query plans by approximating the…
▽ More
Previous approaches to learned cardinality estimation have focused on improving average estimation error, but not all estimates matter equally. Since learned models inevitably make mistakes, the goal should be to improve the estimates that make the biggest difference to an optimizer. We introduce a new loss function, Flow-Loss, that explicitly optimizes for better query plans by approximating the optimizer's cost model and dynamic programming search algorithm with analytical functions. At the heart of Flow-Loss is a reduction of query optimization to a flow routing problem on a certain plan graph in which paths correspond to different query plans. To evaluate our approach, we introduce the Cardinality Estimation Benchmark, which contains the ground truth cardinalities for sub-plans of over 16K queries from 21 templates with up to 15 joins. We show that across different architectures and databases, a model trained with Flow-Loss improves the cost of plans (using the PostgreSQL cost model) and query runtimes despite having worse estimation accuracy than a model trained with Q-Error. When the test set queries closely match the training queries, both models improve performance significantly over PostgreSQL and are close to the optimal performance (using true cardinalities). However, the Q-Error trained model degrades significantly when evaluated on queries that are slightly different (e.g., similar but not identical query templates), while the Flow-Loss trained model generalizes better to such situations. For example, the Flow-Loss model achieves up to 1.5x better runtimes on unseen templates compared to the Q-Error model, despite leveraging the same model architecture and training data.
△ Less
Submitted 13 January, 2021;
originally announced January 2021.
-
Cortex: Harnessing Correlations to Boost Query Performance
Authors:
Vikram Nathan,
Jialin Ding,
Tim Kraska,
Mohammad Alizadeh
Abstract:
Databases employ indexes to filter out irrelevant records, which reduces scan overhead and speeds up query execution. However, this optimization is only available to queries that filter on the indexed attribute. To extend these speedups to queries on other attributes, database systems have turned to secondary and multi-dimensional indexes. Unfortunately, these approaches are restrictive: secondary…
▽ More
Databases employ indexes to filter out irrelevant records, which reduces scan overhead and speeds up query execution. However, this optimization is only available to queries that filter on the indexed attribute. To extend these speedups to queries on other attributes, database systems have turned to secondary and multi-dimensional indexes. Unfortunately, these approaches are restrictive: secondary indexes have a large memory footprint and can only speed up queries that access a small number of records, and multi-dimensional indexes cannot scale to more than a handful of columns. We present Cortex, an approach that takes advantage of correlations to extend the reach of primary indexes to more attributes. Unlike prior work, Cortex can adapt itself to any existing primary index, whether single or multi-dimensional, to harness a broad variety of correlations, such as those that exist between more than two attributes or have a large number of outliers. We demonstrate that on real datasets exhibiting these diverse types of correlations, Cortex matches or outperforms traditional secondary indexes with $5\times$ less space, and it is $2-8\times$ faster than existing approaches to indexing correlations.
△ Less
Submitted 11 December, 2020;
originally announced December 2020.
-
Site-to-Site Internet Traffic Control
Authors:
Frank Cangialosi,
Akshay Narayan,
Prateesh Goyal,
Radhika Mittal,
Mohammad Alizadeh,
Hari Balakrishnan
Abstract:
Queues allow network operators to control traffic: where queues build, they can enforce scheduling and sha** policies. In the Internet today, however, there is a mismatch between where queues build and where control is most effectively enforced; queues build at bottleneck links that are often not under the control of the data sender. To resolve this mismatch, we propose a new kind of middlebox,…
▽ More
Queues allow network operators to control traffic: where queues build, they can enforce scheduling and sha** policies. In the Internet today, however, there is a mismatch between where queues build and where control is most effectively enforced; queues build at bottleneck links that are often not under the control of the data sender. To resolve this mismatch, we propose a new kind of middlebox, called Bundler. Bundler uses a novel inner control loop between a sendbox (in the sender's site) and a receivebox (in the receiver's site) to determine the aggregate rate for the bundle, leaving the end-to-end connections and their control loops intact. Enforcing this sending rate ensures that bottleneck queues that would have built up from the bundle's packets now shift from the bottleneck to the sendbox. The sendbox then exercises control over its traffic by scheduling packets to achieve higher-level objectives. We have implemented Bundler in Linux and evaluated it with real-world and emulation experiments. We find that Bundler allows the sender-chosen policy to be effective: when configured to implement Stochastic Fairness Queueing (SFQ), it improves median flow completion time (FCT) by between 28% and 97% across various scenarios.
△ Less
Submitted 27 April, 2021; v1 submitted 2 November, 2020;
originally announced November 2020.
-
Cumulative Tsallis Entropy for Maximum Ranked Set Sampling with Unequal Samples
Authors:
S. Tahmasebi,
M. Longobardi,
M. R. Kazemi,
M. Alizadeh
Abstract:
In this paper, we consider the information content of maximum ranked set sampling procedure with unequal samples (MRSSU) in terms of Tsallis entropy which is a nonadditive generalization of Shannon entropy. We obtain several results of Tsallis entropy including bounds, monotonic properties, stochastic orders, and sharp bounds under some assumptions. We also compare the uncertainty and information…
▽ More
In this paper, we consider the information content of maximum ranked set sampling procedure with unequal samples (MRSSU) in terms of Tsallis entropy which is a nonadditive generalization of Shannon entropy. We obtain several results of Tsallis entropy including bounds, monotonic properties, stochastic orders, and sharp bounds under some assumptions. We also compare the uncertainty and information content of MRSSU with its counterpart in the simple random sampling (SRS) data. Finally, we develop some characterization results in terms of cumulative Tsallis entropy and residual Tsallis entropy of MRSSU and SRS data.
△ Less
Submitted 25 October, 2020;
originally announced October 2020.
-
Stage-wise Conservative Linear Bandits
Authors:
Ahmadreza Moradipari,
Christos Thrampoulidis,
Mahnoosh Alizadeh
Abstract:
We study stage-wise conservative linear stochastic bandits: an instance of bandit optimization, which accounts for (unknown) safety constraints that appear in applications such as online advertising and medical trials. At each stage, the learner must choose actions that not only maximize cumulative reward across the entire time horizon but further satisfy a linear baseline constraint that takes th…
▽ More
We study stage-wise conservative linear stochastic bandits: an instance of bandit optimization, which accounts for (unknown) safety constraints that appear in applications such as online advertising and medical trials. At each stage, the learner must choose actions that not only maximize cumulative reward across the entire time horizon but further satisfy a linear baseline constraint that takes the form of a lower bound on the instantaneous reward. For this problem, we present two novel algorithms, stage-wise conservative linear Thompson Sampling (SCLTS) and stage-wise conservative linear UCB (SCLUCB), that respect the baseline constraints and enjoy probabilistic regret bounds of order O(\sqrt{T} \log^{3/2}T) and O(\sqrt{T} \log T), respectively. Notably, the proposed algorithms can be adjusted with only minor modifications to tackle different problem variations, such as constraints with bandit-feedback, or an unknown sequence of baseline actions. We discuss these and other improvements over the state-of-the-art. For instance, compared to existing solutions, we show that SCLTS plays the (non-optimal) baseline action at most O(\log{T}) times (compared to O(\sqrt{T})). Finally, we make connections to another studied form of safety constraints that takes the form of an upper bound on the instantaneous reward. While this incurs additional complexity to the learning process as the optimal action is not guaranteed to belong to the safe set at each round, we show that SCLUCB can properly adjust in this setting via a simple modification.
△ Less
Submitted 30 September, 2020;
originally announced October 2020.
-
On Robustness of the Normalized Subgradient Method with Randomly Corrupted Subgradients
Authors:
Berkay Turan,
Cesar A. Uribe,
Hoi-To Wai,
Mahnoosh Alizadeh
Abstract:
Numerous modern optimization and machine learning algorithms rely on subgradient information being trustworthy and hence, they may fail to converge when such information is corrupted. In this paper, we consider the setting where subgradient information may be arbitrarily corrupted (with a given probability) and study the robustness properties of the normalized subgradient method. Under the probabi…
▽ More
Numerous modern optimization and machine learning algorithms rely on subgradient information being trustworthy and hence, they may fail to converge when such information is corrupted. In this paper, we consider the setting where subgradient information may be arbitrarily corrupted (with a given probability) and study the robustness properties of the normalized subgradient method. Under the probabilistic corruption scenario, we prove that the normalized subgradient method, whose updates rely solely on directional information of the subgradient, converges to a minimizer for convex, strongly convex, and weakly-pseudo convex functions satisfying certain conditions. Numerical evidence on linear regression and logistic classification problems support our results.
△ Less
Submitted 21 March, 2021; v1 submitted 28 September, 2020;
originally announced September 2020.
-
Linear Temporal Public Announcement Logic: a new perspective for reasoning about the knowledge of multi-classifiers
Authors:
Amirhoshang Hoseinpour Dehkordi,
Majid Alizadeh,
Ali Movaghar
Abstract:
In this note, a formal transition system model called LTPAL to extract knowledge in a classification process is suggested. The model combines the Public Announcement Logic (PAL) and the Linear Temporal Logic (LTL). In the model, first, we consider classifiers, which capture single-framed data. Next, we took classifiers for data-stream data input into consideration. Finally, we formalize natural la…
▽ More
In this note, a formal transition system model called LTPAL to extract knowledge in a classification process is suggested. The model combines the Public Announcement Logic (PAL) and the Linear Temporal Logic (LTL). In the model, first, we consider classifiers, which capture single-framed data. Next, we took classifiers for data-stream data input into consideration. Finally, we formalize natural language properties in LTPAL with a video-stream object detection sample.
△ Less
Submitted 24 May, 2022; v1 submitted 8 September, 2020;
originally announced September 2020.
-
Real-world Video Adaptation with Reinforcement Learning
Authors:
Hongzi Mao,
Shannon Chen,
Drew Dimmery,
Shaun Singh,
Drew Blaisdell,
Yuandong Tian,
Mohammad Alizadeh,
Eytan Bakshy
Abstract:
Client-side video players employ adaptive bitrate (ABR) algorithms to optimize user quality of experience (QoE). We evaluate recently proposed RL-based ABR methods in Facebook's web-based video streaming platform. Real-world ABR contains several challenges that requires customized designs beyond off-the-shelf RL algorithms -- we implement a scalable neural network architecture that supports videos…
▽ More
Client-side video players employ adaptive bitrate (ABR) algorithms to optimize user quality of experience (QoE). We evaluate recently proposed RL-based ABR methods in Facebook's web-based video streaming platform. Real-world ABR contains several challenges that requires customized designs beyond off-the-shelf RL algorithms -- we implement a scalable neural network architecture that supports videos with arbitrary bitrate encodings; we design a training method to cope with the variance resulting from the stochasticity in network conditions; and we leverage constrained Bayesian optimization for reward sha** in order to optimize the conflicting QoE objectives. In a week-long worldwide deployment with more than 30 million video streaming sessions, our RL approach outperforms the existing human-engineered ABR algorithms.
△ Less
Submitted 28 August, 2020;
originally announced August 2020.
-
Meet MASKS: A novel Multi-Classifier's verification approach
Authors:
Amirhoshang Hoseinpour Dehkordi,
Majid Alizadeh,
Ali Movaghar
Abstract:
In this study, a new ensemble approach for classifiers is introduced. A verification method for better error elimination is developed through the integration of multiple classifiers. A multi-agent system comprised of multiple classifiers is designed to verify the satisfaction of the safety property. In order to examine the reasoning concerning the aggregation of the distributed knowledge, a logica…
▽ More
In this study, a new ensemble approach for classifiers is introduced. A verification method for better error elimination is developed through the integration of multiple classifiers. A multi-agent system comprised of multiple classifiers is designed to verify the satisfaction of the safety property. In order to examine the reasoning concerning the aggregation of the distributed knowledge, a logical model has been proposed. To verify predefined properties, a Multi-Agent Systems' Knowledge-Sharing algorithm (MASKS) has been formulated and developed. As a rigorous evaluation, we applied this model to the Fashion-MNIST, MNIST, and Fruit-360 datasets, where it reduced the error rate to approximately one-tenth of the individual classifiers.
△ Less
Submitted 2 June, 2022; v1 submitted 3 July, 2020;
originally announced July 2020.
-
Sat2Graph: Road Graph Extraction through Graph-Tensor Encoding
Authors:
Songtao He,
Favyen Bastani,
Satvat Jagwani,
Mohammad Alizadeh,
Hari Balakrishnan,
Sanjay Chawla,
Mohamed M. Elshrif,
Samuel Madden,
Amin Sadeghi
Abstract:
Inferring road graphs from satellite imagery is a challenging computer vision task. Prior solutions fall into two categories: (1) pixel-wise segmentation-based approaches, which predict whether each pixel is on a road, and (2) graph-based approaches, which predict the road graph iteratively. We find that these two approaches have complementary strengths while suffering from their own inherent limi…
▽ More
Inferring road graphs from satellite imagery is a challenging computer vision task. Prior solutions fall into two categories: (1) pixel-wise segmentation-based approaches, which predict whether each pixel is on a road, and (2) graph-based approaches, which predict the road graph iteratively. We find that these two approaches have complementary strengths while suffering from their own inherent limitations.
In this paper, we propose a new method, Sat2Graph, which combines the advantages of the two prior categories into a unified framework. The key idea in Sat2Graph is a novel encoding scheme, graph-tensor encoding (GTE), which encodes the road graph into a tensor representation. GTE makes it possible to train a simple, non-recurrent, supervised model to predict a rich set of features that capture the graph structure directly from an image. We evaluate Sat2Graph using two large datasets. We find that Sat2Graph surpasses prior methods on two widely used metrics, TOPO and APLS. Furthermore, whereas prior work only infers planar road graphs, our approach is capable of inferring stacked roads (e.g., overpasses), and does so robustly.
△ Less
Submitted 18 July, 2020;
originally announced July 2020.
-
Competition in Electric Autonomous Mobility on Demand Systems
Authors:
Berkay Turan,
Mahnoosh Alizadeh
Abstract:
This paper investigates the impacts of competition in autonomous mobility-on-demand systems. By adopting a network-flow based formulation, we first determine the optimal strategies of profit-maximizing platform operators in monopoly and duopoly markets, including the optimal prices of rides. Furthermore, we characterize the platform operator's profits and the consumer surplus. We show that for the…
▽ More
This paper investigates the impacts of competition in autonomous mobility-on-demand systems. By adopting a network-flow based formulation, we first determine the optimal strategies of profit-maximizing platform operators in monopoly and duopoly markets, including the optimal prices of rides. Furthermore, we characterize the platform operator's profits and the consumer surplus. We show that for the duopoly, the equilibrium prices for rides have to be symmetric between the firms. Then, in order to study the benefits of introducing competition in the market, we derive universal theoretical bounds on the ratio of prices for rides, aggregate demand served, profits of the firms, and consumer surplus between the monopolistic and the duopolistic setting. We discuss how consumers' firm loyalty affects each of the aforementioned metrics. Finally, using the Manhattan network and demand data, we quantify the efficacy of static pricing and routing policies and compare it to real-time model predictive policies.
△ Less
Submitted 15 July, 2021; v1 submitted 12 July, 2020;
originally announced July 2020.
-
Single Shot Structured Pruning Before Training
Authors:
Joost van Amersfoort,
Milad Alizadeh,
Sebastian Farquhar,
Nicholas Lane,
Yarin Gal
Abstract:
We introduce a method to speed up training by 2x and inference by 3x in deep neural networks using structured pruning applied before training. Unlike previous works on pruning before training which prune individual weights, our work develops a methodology to remove entire channels and hidden units with the explicit aim of speeding up training and inference. We introduce a compute-aware scoring mec…
▽ More
We introduce a method to speed up training by 2x and inference by 3x in deep neural networks using structured pruning applied before training. Unlike previous works on pruning before training which prune individual weights, our work develops a methodology to remove entire channels and hidden units with the explicit aim of speeding up training and inference. We introduce a compute-aware scoring mechanism which enables pruning in units of sensitivity per FLOP removed, allowing even greater speed ups. Our method is fast, easy to implement, and needs just one forward/backward pass on a single batch of data to complete pruning before training begins.
△ Less
Submitted 1 July, 2020;
originally announced July 2020.
-
Tsunami: A Learned Multi-dimensional Index for Correlated Data and Skewed Workloads
Authors:
Jialin Ding,
Vikram Nathan,
Mohammad Alizadeh,
Tim Kraska
Abstract:
Filtering data based on predicates is one of the most fundamental operations for any modern data warehouse. Techniques to accelerate the execution of filter expressions include clustered indexes, specialized sort orders (e.g., Z-order), multi-dimensional indexes, and, for high selectivity queries, secondary indexes. However, these schemes are hard to tune and their performance is inconsistent. Rec…
▽ More
Filtering data based on predicates is one of the most fundamental operations for any modern data warehouse. Techniques to accelerate the execution of filter expressions include clustered indexes, specialized sort orders (e.g., Z-order), multi-dimensional indexes, and, for high selectivity queries, secondary indexes. However, these schemes are hard to tune and their performance is inconsistent. Recent work on learned multi-dimensional indexes has introduced the idea of automatically optimizing an index for a particular dataset and workload. However, the performance of that work suffers in the presence of correlated data and skewed query workloads, both of which are common in real applications. In this paper, we introduce Tsunami, which addresses these limitations to achieve up to 6X faster query performance and up to 8X smaller index size than existing learned multi-dimensional indexes, in addition to up to 11X faster query performance and 170X smaller index size than optimally-tuned traditional indexes.
△ Less
Submitted 23 June, 2020;
originally announced June 2020.
-
Real-Time Video Inference on Edge Devices via Adaptive Model Streaming
Authors:
Mehrdad Khani,
Pouya Hamadanian,
Arash Nasr-Esfahany,
Mohammad Alizadeh
Abstract:
Real-time video inference on edge devices like mobile phones and drones is challenging due to the high computation cost of Deep Neural Networks. We present Adaptive Model Streaming (AMS), a new approach to improving performance of efficient lightweight models for video inference on edge devices. AMS uses a remote server to continually train and adapt a small model running on the edge device, boost…
▽ More
Real-time video inference on edge devices like mobile phones and drones is challenging due to the high computation cost of Deep Neural Networks. We present Adaptive Model Streaming (AMS), a new approach to improving performance of efficient lightweight models for video inference on edge devices. AMS uses a remote server to continually train and adapt a small model running on the edge device, boosting its performance on the live video using online knowledge distillation from a large, state-of-the-art model. We discuss the challenges of over-the-network model adaptation for video inference, and present several techniques to reduce communication cost of this approach: avoiding excessive overfitting, updating a small fraction of important model parameters, and adaptive sampling of training frames at edge devices. On the task of video semantic segmentation, our experimental results show 0.4--17.8 percent mean Intersection-over-Union improvement compared to a pre-trained model across several video datasets. Our prototype can perform video segmentation at 30 frames-per-second with 40 milliseconds camera-to-label latency on a Samsung Galaxy S10+ mobile phone, using less than 300 Kbps uplink and downlink bandwidth on the device.
△ Less
Submitted 5 April, 2021; v1 submitted 11 June, 2020;
originally announced June 2020.
-
Regret Bounds for Safe Gaussian Process Bandit Optimization
Authors:
Sanae Amani,
Mahnoosh Alizadeh,
Christos Thrampoulidis
Abstract:
Many applications require a learner to make sequential decisions given uncertainty regarding both the system's payoff function and safety constraints. In safety-critical systems, it is paramount that the learner's actions do not violate the safety constraints at any stage of the learning process. In this paper, we study a stochastic bandit optimization problem where the unknown payoff and constrai…
▽ More
Many applications require a learner to make sequential decisions given uncertainty regarding both the system's payoff function and safety constraints. In safety-critical systems, it is paramount that the learner's actions do not violate the safety constraints at any stage of the learning process. In this paper, we study a stochastic bandit optimization problem where the unknown payoff and constraint functions are sampled from Gaussian Processes (GPs) first considered in [Srinivas et al., 2010]. We develop a safe variant of GP-UCB called SGP-UCB, with necessary modifications to respect safety constraints at every round. The algorithm has two distinct phases. The first phase seeks to estimate the set of safe actions in the decision set, while the second phase follows the GP-UCB decision rule. Our main contribution is to derive the first sub-linear regret bounds for this problem. We numerically compare SGP-UCB against existing safe Bayesian GP optimization algorithms.
△ Less
Submitted 4 May, 2020;
originally announced May 2020.
-
Learned Garbage Collection
Authors:
Lu**g Cen,
Ryan Marcus,
Hongzi Mao,
Justin Gottschlich,
Mohammad Alizadeh,
Tim Kraska
Abstract:
Several programming languages use garbage collectors (GCs) to automatically manage memory for the programmer. Such collectors must decide when to look for unreachable objects to free, which can have a large performance impact on some applications. In this preliminary work, we propose a design for a learned garbage collector that autonomously learns over time when to perform collections. By using r…
▽ More
Several programming languages use garbage collectors (GCs) to automatically manage memory for the programmer. Such collectors must decide when to look for unreachable objects to free, which can have a large performance impact on some applications. In this preliminary work, we propose a design for a learned garbage collector that autonomously learns over time when to perform collections. By using reinforcement learning, our design can incorporate user-defined reward functions, allowing an autonomous garbage collector to learn to optimize the exact metric the user desires (e.g., request latency or queries per second). We conduct an initial experimental study on a prototype, demonstrating that an approach based on tabular Q learning may be promising.
△ Less
Submitted 28 April, 2020;
originally announced April 2020.
-
Bao: Learning to Steer Query Optimizers
Authors:
Ryan Marcus,
Parimarjan Negi,
Hongzi Mao,
Nesime Tatbul,
Mohammad Alizadeh,
Tim Kraska
Abstract:
Query optimization remains one of the most challenging problems in data management systems. Recent efforts to apply machine learning techniques to query optimization challenges have been promising, but have shown few practical gains due to substantive training overhead, inability to adapt to changes, and poor tail performance. Motivated by these difficulties and drawing upon a long history of rese…
▽ More
Query optimization remains one of the most challenging problems in data management systems. Recent efforts to apply machine learning techniques to query optimization challenges have been promising, but have shown few practical gains due to substantive training overhead, inability to adapt to changes, and poor tail performance. Motivated by these difficulties and drawing upon a long history of research in multi-armed bandits, we introduce Bao (the BAndit Optimizer). Bao takes advantage of the wisdom built into existing query optimizers by providing per-query optimization hints. Bao combines modern tree convolutional neural networks with Thompson sampling, a decades-old and well-studied reinforcement learning algorithm. As a result, Bao automatically learns from its mistakes and adapts to changes in query workloads, data, and schema. Experimentally, we demonstrate that Bao can quickly (an order of magnitude faster than previous approaches) learn strategies that improve end-to-end query execution performance, including tail latency. In cloud environments, we show that Bao can offer both reduced costs and better performance compared with a sophisticated commercial system.
△ Less
Submitted 8 April, 2020;
originally announced April 2020.
-
Understanding Epidemic Data and Statistics: A case study of COVID-19
Authors:
Amirhoshang Hoseinpour Dehkordi,
Majid Alizadeh,
Pegah Derakhshan,
Peyman Babazadeh,
Arash Jahandideh
Abstract:
The 2019-Novel-Coronavirus (COVID-19) has affected 116 countries (By March 12) and out of more than 118,000 confirmed cases. Understanding the transmission dynamics of the infection in each country which affected on a daily basis and evaluating the effectiveness of control policies is critical for our further actions. To date, the statistics of COVID-19 reported cases show more than 80 percent of…
▽ More
The 2019-Novel-Coronavirus (COVID-19) has affected 116 countries (By March 12) and out of more than 118,000 confirmed cases. Understanding the transmission dynamics of the infection in each country which affected on a daily basis and evaluating the effectiveness of control policies is critical for our further actions. To date, the statistics of COVID-19 reported cases show more than 80 percent of infected had a mild case of disease, while around 14 percent of infected experienced a severe one and about 5 percent are categorized as critical disease victims. Today's report (2020-03-12; daily updates in the prepared website) shows the confirmed cases of COVID-19 in China, South Korea, Italy, and Iran are 80932, 7869, 12462 and 10075; respectively. Calculating the total Case Fatality Rate (CFR) of Italy (2020-03-04), about 7.9% of confirmed cases passed away. Compared to South Korea's rate of 0.76% (10 times lower than Italy) and China's 3.8% (50% lower than Italy), the CFR of Italy is too high. There are some effective policies that yield significant changes in the trend of cases. The lockdown policy in China and Italy (the effect observed after 11 days), Shutdown of all nonessential companies in Hubei (the effect observed after 5 days), combined policy in South Korea and reducing working hours in Iran.
△ Less
Submitted 15 March, 2020;
originally announced March 2020.
-
Gradient $\ell_1$ Regularization for Quantization Robustness
Authors:
Milad Alizadeh,
Arash Behboodi,
Mart van Baalen,
Christos Louizos,
Tijmen Blankevoort,
Max Welling
Abstract:
We analyze the effect of quantizing weights and activations of neural networks on their loss and derive a simple regularization scheme that improves robustness against post-training quantization. By training quantization-ready networks, our approach enables storing a single set of weights that can be quantized on-demand to different bit-widths as energy and memory requirements of the application c…
▽ More
We analyze the effect of quantizing weights and activations of neural networks on their loss and derive a simple regularization scheme that improves robustness against post-training quantization. By training quantization-ready networks, our approach enables storing a single set of weights that can be quantized on-demand to different bit-widths as energy and memory requirements of the application change. Unlike quantization-aware training using the straight-through estimator that only targets a specific bit-width and requires access to training data and pipeline, our regularization-based method paves the way for "on the fly'' post-training quantization to various bit-widths. We show that by modeling quantization as a $\ell_\infty$-bounded perturbation, the first-order term in the loss expansion can be regularized using the $\ell_1$-norm of gradients. We experimentally validate the effectiveness of our regularization scheme on different architectures on CIFAR-10 and ImageNet datasets.
△ Less
Submitted 18 February, 2020;
originally announced February 2020.
-
Augmenting Visual Question Answering with Semantic Frame Information in a Multitask Learning Approach
Authors:
Mehrdad Alizadeh,
Barbara Di Eugenio
Abstract:
Visual Question Answering (VQA) concerns providing answers to Natural Language questions about images. Several deep neural network approaches have been proposed to model the task in an end-to-end fashion. Whereas the task is grounded in visual processing, if the question focuses on events described by verbs, the language understanding component becomes crucial. Our hypothesis is that models should…
▽ More
Visual Question Answering (VQA) concerns providing answers to Natural Language questions about images. Several deep neural network approaches have been proposed to model the task in an end-to-end fashion. Whereas the task is grounded in visual processing, if the question focuses on events described by verbs, the language understanding component becomes crucial. Our hypothesis is that models should be aware of verb semantics, as expressed via semantic role labels, argument types, and/or frame elements. Unfortunately, no VQA dataset exists that includes verb semantic information. Our first contribution is a new VQA dataset (imSituVQA) that we built by taking advantage of the imSitu annotations. The imSitu dataset consists of images manually labeled with semantic frame elements, mostly taken from FrameNet. Second, we propose a multitask CNN-LSTM VQA model that learns to classify the answers as well as the semantic frame elements. Our experiments show that semantic frame element classification helps the VQA system avoid inconsistent responses and improves performance.
△ Less
Submitted 31 January, 2020;
originally announced January 2020.
-
Resilient Primal-Dual Optimization Algorithms for Distributed Resource Allocation
Authors:
Berkay Turan,
Cesar A. Uribe,
Hoi-To Wai,
Mahnoosh Alizadeh
Abstract:
Distributed algorithms for multi-agent resource allocation can provide privacy and scalability over centralized algorithms in many cyber-physical systems. However, the distributed nature of these algorithms can render these systems vulnerable to man-in-the-middle attacks that can lead to non-convergence and infeasibility of resource allocation schemes. In this paper, we propose attack-resilient di…
▽ More
Distributed algorithms for multi-agent resource allocation can provide privacy and scalability over centralized algorithms in many cyber-physical systems. However, the distributed nature of these algorithms can render these systems vulnerable to man-in-the-middle attacks that can lead to non-convergence and infeasibility of resource allocation schemes. In this paper, we propose attack-resilient distributed algorithms based on primal-dual optimization when Byzantine attackers are present in the system. In particular, we design attack-resilient primal-dual algorithms for static and dynamic impersonation attacks by means of robust statistics. For static impersonation attacks, we formulate a robustified optimization model and show that our algorithm guarantees convergence to a neighborhood of the optimal solution of the robustified problem. On the other hand, a robust optimization model is not required for the dynamic impersonation attack scenario and we are able to design an algorithm that is shown to converge to a near-optimal solution of the original problem. We analyze the performances of our algorithms through both theoretical and computational studies.
△ Less
Submitted 15 September, 2020; v1 submitted 2 January, 2020;
originally announced January 2020.
-
RoadTagger: Robust Road Attribute Inference with Graph Neural Networks
Authors:
Songtao He,
Favyen Bastani,
Satvat Jagwani,
Edward Park,
Sofiane Abbar,
Mohammad Alizadeh,
Hari Balakrishnan,
Sanjay Chawla,
Samuel Madden,
Mohammad Amin Sadeghi
Abstract:
Inferring road attributes such as lane count and road type from satellite imagery is challenging. Often, due to the occlusion in satellite imagery and the spatial correlation of road attributes, a road attribute at one position on a road may only be apparent when considering far-away segments of the road. Thus, to robustly infer road attributes, the model must integrate scattered information and c…
▽ More
Inferring road attributes such as lane count and road type from satellite imagery is challenging. Often, due to the occlusion in satellite imagery and the spatial correlation of road attributes, a road attribute at one position on a road may only be apparent when considering far-away segments of the road. Thus, to robustly infer road attributes, the model must integrate scattered information and capture the spatial correlation of features along roads. Existing solutions that rely on image classifiers fail to capture this correlation, resulting in poor accuracy. We find this failure is caused by a fundamental limitation -- the limited effective receptive field of image classifiers. To overcome this limitation, we propose RoadTagger, an end-to-end architecture which combines both Convolutional Neural Networks (CNNs) and Graph Neural Networks (GNNs) to infer road attributes. The usage of graph neural networks allows information propagation on the road network graph and eliminates the receptive field limitation of image classifiers. We evaluate RoadTagger on both a large real-world dataset covering 688 km^2 area in 20 U.S. cities and a synthesized micro-dataset. In the evaluation, RoadTagger improves inference accuracy over the CNN image classifier based approaches. RoadTagger also demonstrates strong robustness against different disruptions in the satellite imagery and the ability to learn complicated inductive rules for aggregating scattered information along the road network.
△ Less
Submitted 28 December, 2019;
originally announced December 2019.
-
A Systematic Comparison of Bayesian Deep Learning Robustness in Diabetic Retinopathy Tasks
Authors:
Angelos Filos,
Sebastian Farquhar,
Aidan N. Gomez,
Tim G. J. Rudner,
Zachary Kenton,
Lewis Smith,
Milad Alizadeh,
Arnoud de Kroon,
Yarin Gal
Abstract:
Evaluation of Bayesian deep learning (BDL) methods is challenging. We often seek to evaluate the methods' robustness and scalability, assessing whether new tools give `better' uncertainty estimates than old ones. These evaluations are paramount for practitioners when choosing BDL tools on-top of which they build their applications. Current popular evaluations of BDL methods, such as the UCI experi…
▽ More
Evaluation of Bayesian deep learning (BDL) methods is challenging. We often seek to evaluate the methods' robustness and scalability, assessing whether new tools give `better' uncertainty estimates than old ones. These evaluations are paramount for practitioners when choosing BDL tools on-top of which they build their applications. Current popular evaluations of BDL methods, such as the UCI experiments, are lacking: Methods that excel with these experiments often fail when used in application such as medical or automotive, suggesting a pertinent need for new benchmarks in the field. We propose a new BDL benchmark with a diverse set of tasks, inspired by a real-world medical imaging application on \emph{diabetic retinopathy diagnosis}. Visual inputs (512x512 RGB images of retinas) are considered, where model uncertainty is used for medical pre-screening---i.e. to refer patients to an expert when model diagnosis is uncertain. Methods are then ranked according to metrics derived from expert-domain to reflect real-world use of model uncertainty in automated diagnosis. We develop multiple tasks that fall under this application, including out-of-distribution detection and robustness to distribution shift. We then perform a systematic comparison of well-tuned BDL techniques on the various tasks. From our comparison we conclude that some current techniques which solve benchmarks such as UCI `overfit' their uncertainty to the dataset---when evaluated on our benchmark these underperform in comparison to simpler baselines. The code for the benchmark, its baselines, and a simple API for evaluating new BDL tools are made available at https://github.com/oatml/bdl-benchmarks.
△ Less
Submitted 22 December, 2019;
originally announced December 2019.
-
Mobility-Aware Smart Charging of Electric Bus Fleets
Authors:
Ahmadreza Moradipari,
Nathaniel Tucker,
Tuo Zhang,
Gustavo Cezar,
Mahnoosh Alizadeh
Abstract:
We study the joint route assignment and charge scheduling problem of a transit system dispatcher operating a fleet of electric buses in order to maximize solar energy integration and reduce energy costs. Specifically, we consider a complex bus transit system with preexisting routes, limited charging infrastructure, limited number of electric buses, and time-varying electricity rates. We present a…
▽ More
We study the joint route assignment and charge scheduling problem of a transit system dispatcher operating a fleet of electric buses in order to maximize solar energy integration and reduce energy costs. Specifically, we consider a complex bus transit system with preexisting routes, limited charging infrastructure, limited number of electric buses, and time-varying electricity rates. We present a mixed integer linear program (MILP) that yields the minimal cost daily operation strategy for the fleet (i.e., route assignments and charging schedules using daily solar forecasts). We present numerical results from a real-world case study with Stanford University's Marguerite Shuttle (a large-scale electric bus fleet) to demonstrate the validity of our solution and highlight the significant cost savings compared to the status quo.
△ Less
Submitted 11 December, 2019;
originally announced December 2019.
-
Learning Multi-dimensional Indexes
Authors:
Vikram Nathan,
Jialin Ding,
Mohammad Alizadeh,
Tim Kraska
Abstract:
Scanning and filtering over multi-dimensional tables are key operations in modern analytical database engines. To optimize the performance of these operations, databases often create clustered indexes over a single dimension or multi-dimensional indexes such as R-trees, or use complex sort orders (e.g., Z-ordering). However, these schemes are often hard to tune and their performance is inconsisten…
▽ More
Scanning and filtering over multi-dimensional tables are key operations in modern analytical database engines. To optimize the performance of these operations, databases often create clustered indexes over a single dimension or multi-dimensional indexes such as R-trees, or use complex sort orders (e.g., Z-ordering). However, these schemes are often hard to tune and their performance is inconsistent across different datasets and queries. In this paper, we introduce Flood, a multi-dimensional in-memory index that automatically adapts itself to a particular dataset and workload by jointly optimizing the index structure and data storage. Flood achieves up to three orders of magnitude faster performance for range scans with predicates than state-of-the-art multi-dimensional indexes or sort orders on real-world datasets and workloads. Our work serves as a building block towards an end-to-end learned database system.
△ Less
Submitted 3 December, 2019;
originally announced December 2019.
-
Safe Linear Thompson Sampling with Side Information
Authors:
Ahmadreza Moradipari,
Sanae Amani,
Mahnoosh Alizadeh,
Christos Thrampoulidis
Abstract:
The design and performance analysis of bandit algorithms in the presence of stage-wise safety or reliability constraints has recently garnered significant interest. In this work, we consider the linear stochastic bandit problem under additional \textit{linear safety constraints} that need to be satisfied at each round. We provide a new safe algorithm based on linear Thompson Sampling (TS) for this…
▽ More
The design and performance analysis of bandit algorithms in the presence of stage-wise safety or reliability constraints has recently garnered significant interest. In this work, we consider the linear stochastic bandit problem under additional \textit{linear safety constraints} that need to be satisfied at each round. We provide a new safe algorithm based on linear Thompson Sampling (TS) for this problem and show a frequentist regret of order $\mathcal{O} (d^{3/2}\log^{1/2}d \cdot T^{1/2}\log^{3/2}T)$, which remarkably matches the results provided by (Abeille et al., 2017) for the standard linear TS algorithm in the absence of safety constraints. We compare the performance of our algorithm with UCB-based safe algorithms and highlight how the inherently randomized nature of TS leads to a superior performance in expanding the set of safe actions the algorithm has access to at each round.
△ Less
Submitted 29 February, 2020; v1 submitted 5 November, 2019;
originally announced November 2019.
-
Inferring and Improving Street Maps with Data-Driven Automation
Authors:
Favyen Bastani,
Songtao He,
Satvat Jagwani,
Edward Park,
Sofiane Abbar,
Mohammad Alizadeh,
Hari Balakrishnan,
Sanjay Chawla,
Sam Madden,
Mohammad Amin Sadeghi
Abstract:
Street maps are a crucial data source that help to inform a wide range of decisions, from navigating a city to disaster relief and urban planning. However, in many parts of the world, street maps are incomplete or lag behind new construction. Editing maps today involves a tedious process of manually tracing and annotating roads, buildings, and other map features.
Over the past decade, many autom…
▽ More
Street maps are a crucial data source that help to inform a wide range of decisions, from navigating a city to disaster relief and urban planning. However, in many parts of the world, street maps are incomplete or lag behind new construction. Editing maps today involves a tedious process of manually tracing and annotating roads, buildings, and other map features.
Over the past decade, many automatic map inference systems have been proposed to automatically extract street map data from satellite imagery, aerial imagery, and GPS trajectory datasets. However, automatic map inference has failed to gain traction in practice due to two key limitations: high error rates (low precision), which manifest in noisy inference outputs, and a lack of end-to-end system design to leverage inferred data to update existing street maps.
At MIT and QCRI, we have developed a number of algorithms and approaches to address these challenges, which we combined into a new system we call Mapster. Mapster is a human-in-the-loop street map editing system that incorporates three components to robustly accelerate the map** process over traditional tools and workflows: high-precision automatic map inference, data refinement, and machine-assisted map editing.
Through an evaluation on a large-scale dataset including satellite imagery, GPS trajectories, and ground-truth map data in forty cities, we show that Mapster makes automation practical for map editing, and enables the curation of map datasets that are more complete and up-to-date at less cost.
△ Less
Submitted 6 November, 2019; v1 submitted 1 October, 2019;
originally announced October 2019.
-
Ontology Based Information Integration: A Survey
Authors:
Maryam Alizadeh,
Maliheh Heydarpour Shahrezaei,
Farajollah Tahernezhad-Javazm
Abstract:
An ontology makes a special vocabulary which describes the domain of interest and the meaning of the term on that vocabulary. Based on the precision of the specification, the concept of the ontology contains several data and conceptual models. The notion of ontology has emerged into wide ranges of applications including database integration, peer-to-peer systems, e-commerce, semantic web, etc. It…
▽ More
An ontology makes a special vocabulary which describes the domain of interest and the meaning of the term on that vocabulary. Based on the precision of the specification, the concept of the ontology contains several data and conceptual models. The notion of ontology has emerged into wide ranges of applications including database integration, peer-to-peer systems, e-commerce, semantic web, etc. It can be considered as a practical tool for conceptualizing things which are expressed in computer format. This paper is devoted to ontology matching as a mean or information integration. Several matching solutions have been presented from various areas such as databases, information systems and artificial intelligence. All of them take advantages of different attributes of ontology like, structures, data instances, semantics and labels and its other valuable properties. The solutions have some common techniques and cope with similar problems, but use different methods for combining and exploiting their results. Information integration is among the first classes of applications at which matching was considered as a probable solution. Information integration contains many fields including, data integration, schema integration, catalogue integration and semantic integration. We cover these notions in term of ontology in our proposed paper.
△ Less
Submitted 26 September, 2019;
originally announced September 2019.
-
Practical Low Latency Proof of Work Consensus
Authors:
Lei Yang,
Xuechao Wang,
Vivek Bagaria,
Gerui Wang,
Mohammad Alizadeh,
David Tse,
Giulia Fanti,
Pramod Viswanath
Abstract:
Bitcoin is the first fully-decentralized permissionless blockchain protocol to achieve a high level of security, but at the expense of poor throughput and latency. Scaling the performance of Bitcoin has a been a major recent direction of research. One successful direction of work has involved replacing proof of work (PoW) by proof of stake (PoS). Proposals to scale the performance in the PoW setti…
▽ More
Bitcoin is the first fully-decentralized permissionless blockchain protocol to achieve a high level of security, but at the expense of poor throughput and latency. Scaling the performance of Bitcoin has a been a major recent direction of research. One successful direction of work has involved replacing proof of work (PoW) by proof of stake (PoS). Proposals to scale the performance in the PoW setting itself have focused mostly on parallelizing the mining process, scaling throughput; the few proposals to improve latency have either sacrificed throughput or the latency guarantees involve large constants rendering it practically useless. Our first contribution is to design a new PoW blockchain Prism++ that has provably low latency and high throughput; the design retains the parallel-chain approach espoused in Prism but invents a new confirmation rule to infer the permanency of a block by combining information across the parallel chains. We show security at the level of Bitcoin with very small confirmation latency (a small constant factor of block interarrival time). A key aspect to scaling the performance is to use a large number of parallel chains, which puts significant strain on the system. Our second contribution is the design and evaluation of a practical system to efficiently manage the memory, computation, and I/O imperatives of a large number of parallel chains. Our implementation of Prism++ achieves a throughput of over 80,000 transactions per second and confirmation latency of tens of seconds on networks of up to 900 EC2 Virtual Machines.
△ Less
Submitted 17 February, 2023; v1 submitted 24 September, 2019;
originally announced September 2019.
-
Backpressure Flow Control
Authors:
Prateesh Goyal,
Preey Shah,
Kevin Zhao,
Georgios Nikolaidis,
Mohammad Alizadeh,
Thomas E. Anderson
Abstract:
Effective congestion control for data center networks is becoming increasingly challenging with a growing amount of latency sensitive traffic, much fatter links, and extremely bursty traffic. Widely deployed algorithms, such as DCTCP and DCQCN, are still far from optimal in many plausible scenarios, particularly for tail latency. Many operators compensate by running their networks at low average u…
▽ More
Effective congestion control for data center networks is becoming increasingly challenging with a growing amount of latency sensitive traffic, much fatter links, and extremely bursty traffic. Widely deployed algorithms, such as DCTCP and DCQCN, are still far from optimal in many plausible scenarios, particularly for tail latency. Many operators compensate by running their networks at low average utilization, dramatically increasing costs.
In this paper, we argue that we have reached the practical limits of end-to-end congestion control. Instead, we propose, implement, and evaluate a new congestion control architecture called Backpressure Flow Control (BFC). BFC provides per-hop per-flow flow control, but with bounded state, constant-time switch operations, and careful use of buffers. We demonstrate BFC's feasibility by implementing it on Tofino2, a state-of-the-art P4-based programmable hardware switch. In simulation, we show that BFC achieves near optimal throughput and tail latency behavior even under challenging conditions such as high network load and incast cross traffic. Compared to existing end-to-end schemes, BFC achieves 2.3 - 60 X lower tail latency for short flows and 1.6 - 5 X better average completion time for long flows.
△ Less
Submitted 29 March, 2021; v1 submitted 21 September, 2019;
originally announced September 2019.
-
Dynamic Pricing and Fleet Management for Electric Autonomous Mobility on Demand Systems
Authors:
Berkay Turan,
Ramtin Pedarsani,
Mahnoosh Alizadeh
Abstract:
The proliferation of ride sharing systems is a major drive in the advancement of autonomous and electric vehicle technologies. This paper considers the joint routing, battery charging, and pricing problem faced by a profit-maximizing transportation service provider that operates a fleet of autonomous electric vehicles. We first establish the static planning problem by considering time-invariant sy…
▽ More
The proliferation of ride sharing systems is a major drive in the advancement of autonomous and electric vehicle technologies. This paper considers the joint routing, battery charging, and pricing problem faced by a profit-maximizing transportation service provider that operates a fleet of autonomous electric vehicles. We first establish the static planning problem by considering time-invariant system parameters and determine the optimal static policy. While the static policy provides stability of customer queues waiting for rides even if consider the system dynamics, we see that it is inefficient to utilize a static policy as it can lead to long wait times for customers and low profits. To accommodate for the stochastic nature of trip demands, renewable energy availability, and electricity prices and to further optimally manage the autonomous fleet given the need to generate integer allocations, a real-time policy is required. The optimal real-time policy that executes actions based on full state information of the system is the solution of a complex dynamic program. However, we argue that it is intractable to exactly solve for the optimal policy using exact dynamic programming methods and therefore apply deep reinforcement learning to develop a near-optimal control policy. The two case studies we conducted in Manhattan and San Francisco demonstrate the efficacy of our real-time policy in terms of network stability and profits, while kee** the queue lengths up to 200 times less than the static policy.
△ Less
Submitted 1 October, 2020; v1 submitted 15 September, 2019;
originally announced September 2019.
-
Characterizing the interplay between information and strength in Blotto games
Authors:
Keith Paarporn,
Rahul Chandan,
Mahnoosh Alizadeh,
Jason R. Marden
Abstract:
In this paper, we investigate informational asymmetries in the Colonel Blotto game, a game-theoretic model of competitive resource allocation between two players over a set of battlefields. The battlefield valuations are subject to randomness. One of the two players knows the valuations with certainty. The other knows only a distribution on the battlefield realizations. However, the informed playe…
▽ More
In this paper, we investigate informational asymmetries in the Colonel Blotto game, a game-theoretic model of competitive resource allocation between two players over a set of battlefields. The battlefield valuations are subject to randomness. One of the two players knows the valuations with certainty. The other knows only a distribution on the battlefield realizations. However, the informed player has fewer resources to allocate. We characterize unique equilibrium payoffs in a two battlefield setup of the Colonel Blotto game. We then focus on a three battlefield setup in the General Lotto game, a popular variant of the Colonel Blotto game. We characterize the unique equilibrium payoffs and mixed equilibrium strategies. We quantify the value of information - the difference in equilibrium payoff between the asymmetric information game and complete information game. We find information strictly improves the informed player's performance guarantee. However, the magnitude of improvement varies with the informed player's strength as well as the game parameters. Our analysis highlights the interplay between strength and information in adversarial environments.
△ Less
Submitted 13 September, 2019; v1 submitted 8 September, 2019;
originally announced September 2019.
-
The Impact of Complex and Informed Adversarial Behavior in Graphical Coordination Games
Authors:
Keith Paarporn,
Brian Canty,
Philip N. Brown,
Mahnoosh Alizadeh,
Jason R. Marden
Abstract:
How does system-level information impact the ability of an adversary to degrade performance in a networked control system? How does the complexity of an adversary's strategy affect its ability to degrade performance? This paper focuses on these questions in the context of graphical coordination games where an adversary can influence a given fraction of the agents in the system, and the agents foll…
▽ More
How does system-level information impact the ability of an adversary to degrade performance in a networked control system? How does the complexity of an adversary's strategy affect its ability to degrade performance? This paper focuses on these questions in the context of graphical coordination games where an adversary can influence a given fraction of the agents in the system, and the agents follow log-linear learning, a well-known distributed learning algorithm. Focusing on a class of homogeneous ring graphs of various connectivity, we begin by demonstrating that minimally connected ring graphs are the most susceptible to adversarial influence. We then proceed to characterize how both (i) the sophistication of the attack strategies (static vs dynamic) and (ii) the informational awareness about the network structure can be leveraged by an adversary to degrade system performance. Focusing on the set of adversarial policies that induce stochastically stable states, our findings demonstrate that the relative importance between sophistication and information changes depending on the the influencing power of the adversary. In particular, sophistication far outweighs informational awareness with regards to degrading system-level damage when the adversary's influence power is relatively weak. However, the opposite is true when an adversary's influence power is more substantial.
△ Less
Submitted 3 October, 2020; v1 submitted 5 September, 2019;
originally announced September 2019.
-
Constrained Thompson Sampling for Real-Time Electricity Pricing with Grid Reliability Constraints
Authors:
Nathaniel Tucker,
Ahmadreza Moradipari,
Mahnoosh Alizadeh
Abstract:
We consider the problem of an aggregator attempting to learn customers' load flexibility models while implementing a load sha** program by means of broadcasting daily dispatch signals. We adopt a multi-armed bandit formulation to account for the stochastic and unknown nature of customers' responses to dispatch signals. We propose a constrained Thompson sampling heuristic, Con-TS-RTP, that accoun…
▽ More
We consider the problem of an aggregator attempting to learn customers' load flexibility models while implementing a load sha** program by means of broadcasting daily dispatch signals. We adopt a multi-armed bandit formulation to account for the stochastic and unknown nature of customers' responses to dispatch signals. We propose a constrained Thompson sampling heuristic, Con-TS-RTP, that accounts for various possible aggregator objectives (e.g., to reduce demand at peak hours, integrate more intermittent renewable generation, track a desired daily load profile, etc) and takes into account the operational constraints of a distribution system to avoid potential grid failures as a result of uncertainty in the customers' response. We provide a discussion on the regret bounds for our algorithm as well as a discussion on the operational reliability of the distribution system's constraints being upheld throughout the learning process.
△ Less
Submitted 17 June, 2020; v1 submitted 21 August, 2019;
originally announced August 2019.
-
Linear Stochastic Bandits Under Safety Constraints
Authors:
Sanae Amani,
Mahnoosh Alizadeh,
Christos Thrampoulidis
Abstract:
Bandit algorithms have various application in safety-critical systems, where it is important to respect the system constraints that rely on the bandit's unknown parameters at every round. In this paper, we formulate a linear stochastic multi-armed bandit problem with safety constraints that depend (linearly) on an unknown parameter vector. As such, the learner is unable to identify all safe action…
▽ More
Bandit algorithms have various application in safety-critical systems, where it is important to respect the system constraints that rely on the bandit's unknown parameters at every round. In this paper, we formulate a linear stochastic multi-armed bandit problem with safety constraints that depend (linearly) on an unknown parameter vector. As such, the learner is unable to identify all safe actions and must act conservatively in ensuring that her actions satisfy the safety constraint at all rounds (at least with high probability). For these bandits, we propose a new UCB-based algorithm called Safe-LUCB, which includes necessary modifications to respect safety constraints. The algorithm has two phases. During the pure exploration phase the learner chooses her actions at random from a restricted set of safe actions with the goal of learning a good approximation of the entire unknown safe set. Once this goal is achieved, the algorithm begins a safe exploration-exploitation phase where the learner gradually expands their estimate of the set of safe actions while controlling the growth of regret. We provide a general regret bound for the algorithm, as well as a problem dependent bound that is connected to the location of the optimal action within the safe set. We then propose a modified heuristic that exploits our problem dependent analysis to improve the regret.
△ Less
Submitted 15 August, 2019;
originally announced August 2019.
-
Low-cost low-power in-vehicle occupant detection with mm-wave FMCW radar
Authors:
Mostafa Alizadeh,
Hajar Abedi,
George Shaker
Abstract:
In this paper, we use a low-cost low-power mm-wave frequency modulated continuous wave (FMCW) radar for the in-vehicle occupant detection. We propose an algorithm using Capon filter for the joint range-azimuth estimation. Then, the minimum necessary features are extracted to train machine learning classifiers to have reasonable computational complexity while achieving high accuracy. In addition, e…
▽ More
In this paper, we use a low-cost low-power mm-wave frequency modulated continuous wave (FMCW) radar for the in-vehicle occupant detection. We propose an algorithm using Capon filter for the joint range-azimuth estimation. Then, the minimum necessary features are extracted to train machine learning classifiers to have reasonable computational complexity while achieving high accuracy. In addition, experiments were carried out in a minivan to detect occupancy of each row using support vector machine (SVM). Finally, our proposed system achieved 97.8% accuracy on average in finding the defined scenarios. Moreover, the system can correctly identify if the vehicle is occupied or not with 100% accuracy.
△ Less
Submitted 12 August, 2019;
originally announced August 2019.
-
Online Charge Scheduling for Electric Vehicles in Autonomous Mobility on Demand Fleets
Authors:
Nathaniel Tucker,
Berkay Turan,
Mahnoosh Alizadeh
Abstract:
In this paper, we study an online charge scheduling strategy for fleets of autonomous-mobility-on-demand electric vechicles (AMoD EVs). We consider the case where vehicles complete trips and then enter a between-ride state throughout the day, with their information becoming available to the fleet operator in an online fashion. In the between-ride state, the vehicles must be scheduled for charging…
▽ More
In this paper, we study an online charge scheduling strategy for fleets of autonomous-mobility-on-demand electric vechicles (AMoD EVs). We consider the case where vehicles complete trips and then enter a between-ride state throughout the day, with their information becoming available to the fleet operator in an online fashion. In the between-ride state, the vehicles must be scheduled for charging and then routed to their next passenger pick-up locations. Additionally, due to the unknown daily sequences of ride requests, the problem cannot be solved by any offline approach. As such, we study an online welfare maximization heuristic based on primal-dual methods that allocates limited fleet charging resources and rebalances the vehicles while avoiding congestion at charging facilities and pick-up locations. We discuss a competitive ratio result comparing the performance of our online solution to the clairvoyant offline solution and provide numerical results highlighting the performance of our heuristic.
△ Less
Submitted 1 July, 2019;
originally announced July 2019.
-
Smart Charging Benefits in Autonomous Mobility on Demand Systems
Authors:
Berkay Turan,
Nathaniel Tucker,
Mahnoosh Alizadeh
Abstract:
In this paper, we study the potential benefits from smart charging for a fleet of electric vehicles (EVs) providing autonomous mobility-on-demand (AMoD) services. We first consider a profit-maximizing platform operator who makes decisions for routing, charging, rebalancing, and pricing for rides based on a network flow model. Clearly, each of these decisions directly influence the fleet's smart ch…
▽ More
In this paper, we study the potential benefits from smart charging for a fleet of electric vehicles (EVs) providing autonomous mobility-on-demand (AMoD) services. We first consider a profit-maximizing platform operator who makes decisions for routing, charging, rebalancing, and pricing for rides based on a network flow model. Clearly, each of these decisions directly influence the fleet's smart charging potential; however, it is not possible to directly characterize the effects of various system parameters on smart charging under a classical network flow model. As such, we propose a modeling variation that allows us to decouple the charging and routing problems faced by the operator. This variation allows us to provide closed-form mathematical expressions relating the charging costs to the maximum battery capacity of the vehicles as well as the fleet operational costs. We show that investing in larger battery capacities and operating more vehicles for rebalancing reduces the charging costs, while increasing the fleet operational costs. Hence, we study the trade-off the operator faces, analyze the minimum cost fleet charging strategy, and provide numerical results illustrating the smart charging benefits to the operator.
△ Less
Submitted 17 September, 2019; v1 submitted 28 June, 2019;
originally announced July 2019.
-
Placeto: Learning Generalizable Device Placement Algorithms for Distributed Machine Learning
Authors:
Ravichandra Addanki,
Shaileshh Bojja Venkatakrishnan,
Shreyan Gupta,
Hongzi Mao,
Mohammad Alizadeh
Abstract:
We present Placeto, a reinforcement learning (RL) approach to efficiently find device placements for distributed neural network training. Unlike prior approaches that only find a device placement for a specific computation graph, Placeto can learn generalizable device placement policies that can be applied to any graph. We propose two key ideas in our approach: (1) we represent the policy as perfo…
▽ More
We present Placeto, a reinforcement learning (RL) approach to efficiently find device placements for distributed neural network training. Unlike prior approaches that only find a device placement for a specific computation graph, Placeto can learn generalizable device placement policies that can be applied to any graph. We propose two key ideas in our approach: (1) we represent the policy as performing iterative placement improvements, rather than outputting a placement in one shot; (2) we use graph embeddings to capture relevant information about the structure of the computation graph, without relying on node labels for indexing. These ideas allow Placeto to train efficiently and generalize to unseen graphs. Our experiments show that Placeto requires up to 6.1x fewer training steps to find placements that are on par with or better than the best placements found by prior approaches. Moreover, Placeto is able to learn a generalizable placement policy for any given family of graphs, which can then be used without any retraining to predict optimized placements for unseen graphs from the same family. This eliminates the large overhead incurred by prior RL approaches whose lack of generalizability necessitates re-training from scratch every time a new graph is to be placed.
△ Less
Submitted 20 June, 2019;
originally announced June 2019.