Skip to main content

Showing 1–5 of 5 results for author: Hecker, A

.
  1. Multi-Agent Reinforcement Learning for Long-Term Network Resource Allocation through Auction: a V2X Application

    Authors: **g Tan, Ramin Khalili, Holger Karl, Artur Hecker

    Abstract: We formulate offloading of computational tasks from a dynamic group of mobile agents (e.g., cars) as decentralized decision making among autonomous agents. We design an interaction mechanism that incentivizes such agents to align private and system goals by balancing between competition and cooperation. In the static case, the mechanism provably has Nash equilibria with optimal resource allocation… ▽ More

    Submitted 29 July, 2022; originally announced August 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2204.02267

  2. Multi-Agent Distributed Reinforcement Learning for Making Decentralized Offloading Decisions

    Authors: **g Tan, Ramin Khalili, Holger Karl, Artur Hecker

    Abstract: We formulate computation offloading as a decentralized decision-making problem with autonomous agents. We design an interaction mechanism that incentivizes agents to align private and system goals by balancing between competition and cooperation. The mechanism provably has Nash equilibria with optimal resource allocation in the static case. For a dynamic environment, we propose a novel multi-agent… ▽ More

    Submitted 5 April, 2022; originally announced April 2022.

  3. arXiv:2110.01381  [pdf, other

    cs.NI

    In-Network Processing Acoustic Data for Anomaly Detection in Smart Factory

    Authors: Huanzhuo Wu, Yunbin Shen, Xun Xiao, Artur Hecker, Frank H. P. Fitzek

    Abstract: Modern manufacturing is now deeply integrating new technologies such as 5G, Internet-of-things (IoT), and cloud/edge computing to shape manufacturing to a new level -- Smart Factory. Autonomic anomaly detection (e.g., malfunctioning machines and hazard situations) in a factory hall is on the list and expects to be realized with massive IoT sensor deployments. In this paper, we consider acoustic da… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

  4. arXiv:2004.11665  [pdf

    cs.CR cs.NI

    6G White paper: Research challenges for Trust, Security and Privacy

    Authors: Mika Ylianttila, Raimo Kantola, Andrei Gurtov, Lozenzo Mucchi, Ian Oppermann, Zheng Yan, Tri Hong Nguyen, Fei Liu, Tharaka Hewa, Madhusanka Liyanage, Ahmad Ijaz, Juha Partala, Robert Abbas, Artur Hecker, Sara Jayousi, Alessio Martinelli, Stefano Caputo, Jonathan Bechtold, Ivan Morales, Andrei Stoica, Giuseppe Abreu, Shahriar Shahabuddin, Erdal Panayirci, Harald Haas, Tanesh Kumar , et al. (2 additional authors not shown)

    Abstract: The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust: Under the current "open internet" regulation, the… ▽ More

    Submitted 30 April, 2020; v1 submitted 24 April, 2020; originally announced April 2020.

  5. arXiv:2004.10887  [pdf, other

    cs.SE cs.LG cs.NI

    Towards Runtime Verification of Programmable Switches

    Authors: Apoorv Shukla, Kevin Hudemann, Zsolt Vági, Lily Hügerich, Georgios Smaragdakis, Stefan Schmid, Artur Hecker, Anja Feldmann

    Abstract: Is it possible to patch software bugs in P4 programs without human involvement? We show that this is partially possible in many cases due to advances in software testing and the structure of P4 programs. Our insight is that runtime verification can detect bugs, even those that are not detected at compile-time, with machine learning-guided fuzzing. This enables a more automated and real-time locali… ▽ More

    Submitted 26 April, 2020; v1 submitted 22 April, 2020; originally announced April 2020.

    Comments: added a missing author name to a reference