-
Adaptive Experimental Design for Intrusion Data Collection
Authors:
Kate Highnam,
Zach Hanif,
Ellie Van Vogt,
Sonali Parbhoo,
Sergio Maffeis,
Nicholas R. Jennings
Abstract:
Intrusion research frequently collects data on attack techniques currently employed and their potential symptoms. This includes deploying honeypots, logging events from existing devices, employing a red team for a sample attack campaign, or simulating system activity. However, these observational studies do not clearly discern the cause-and-effect relationships between the design of the environmen…
▽ More
Intrusion research frequently collects data on attack techniques currently employed and their potential symptoms. This includes deploying honeypots, logging events from existing devices, employing a red team for a sample attack campaign, or simulating system activity. However, these observational studies do not clearly discern the cause-and-effect relationships between the design of the environment and the data recorded. Neglecting such relationships increases the chance of drawing biased conclusions due to unconsidered factors, such as spurious correlations between features and errors in measurement or classification. In this paper, we present the theory and empirical data on methods that aim to discover such causal relationships efficiently. Our adaptive design (AD) is inspired by the clinical trial community: a variant of a randomized control trial (RCT) to measure how a particular ``treatment'' affects a population. To contrast our method with observational studies and RCT, we run the first controlled and adaptive honeypot deployment study, identifying the causal relationship between an ssh vulnerability and the rate of server exploitation. We demonstrate that our AD method decreases the total time needed to run the deployment by at least 33%, while still confidently stating the impact of our change in the environment. Compared to an analogous honeypot study with a control group, our AD requests 17% fewer honeypots while collecting 19% more attack recordings than an analogous honeypot study with a control group.
△ Less
Submitted 19 October, 2023;
originally announced October 2023.
-
Curvature Aligned Simplex Gradient: Principled Sample Set Construction For Numerical Differentiation
Authors:
Daniel Lengyel,
Panos Parpas,
Nikolas Kantas,
Nicholas R. Jennings
Abstract:
The simplex gradient, a popular numerical differentiation method due to its flexibility, lacks a principled method by which to construct the sample set, specifically the location of function evaluations. Such evaluations, especially from real-world systems, are often noisy and expensive to obtain, making it essential that each evaluation is carefully chosen to reduce cost and increase accuracy. Th…
▽ More
The simplex gradient, a popular numerical differentiation method due to its flexibility, lacks a principled method by which to construct the sample set, specifically the location of function evaluations. Such evaluations, especially from real-world systems, are often noisy and expensive to obtain, making it essential that each evaluation is carefully chosen to reduce cost and increase accuracy. This paper introduces the curvature aligned simplex gradient (CASG), which provably selects the optimal sample set under a mean squared error objective. As CASG requires function-dependent information often not available in practice, we additionally introduce a framework which exploits a history of function evaluations often present in practical applications. Our numerical results, focusing on applications in sensitivity analysis and derivative free optimization, show that our methodology significantly outperforms or matches the performance of the benchmark gradient estimator given by forward differences (FD) which is given exact function-dependent information that is not available in practice. Furthermore, our methodology is comparable to the performance of central differences (CD) that requires twice the number of function evaluations.
△ Less
Submitted 19 October, 2023;
originally announced October 2023.
-
The Future of Fundamental Science Led by Generative Closed-Loop Artificial Intelligence
Authors:
Hector Zenil,
Jesper Tegnér,
Felipe S. Abrahão,
Alexander Lavin,
Vipin Kumar,
Jeremy G. Frey,
Adrian Weller,
Larisa Soldatova,
Alan R. Bundy,
Nicholas R. Jennings,
Koichi Takahashi,
Lawrence Hunter,
Saso Dzeroski,
Andrew Briggs,
Frederick D. Gregory,
Carla P. Gomes,
Jon Rowe,
James Evans,
Hiroaki Kitano,
Ross King
Abstract:
Recent advances in machine learning and AI, including Generative AI and LLMs, are disrupting technological innovation, product development, and society as a whole. AI's contribution to technology can come from multiple approaches that require access to large training data sets and clear performance evaluation criteria, ranging from pattern recognition and classification to generative models. Yet,…
▽ More
Recent advances in machine learning and AI, including Generative AI and LLMs, are disrupting technological innovation, product development, and society as a whole. AI's contribution to technology can come from multiple approaches that require access to large training data sets and clear performance evaluation criteria, ranging from pattern recognition and classification to generative models. Yet, AI has contributed less to fundamental science in part because large data sets of high-quality data for scientific practice and model discovery are more difficult to access. Generative AI, in general, and Large Language Models in particular, may represent an opportunity to augment and accelerate the scientific discovery of fundamental deep science with quantitative models. Here we explore and investigate aspects of an AI-driven, automated, closed-loop approach to scientific discovery, including self-driven hypothesis generation and open-ended autonomous exploration of the hypothesis space. Integrating AI-driven automation into the practice of science would mitigate current problems, including the replication of findings, systematic production of data, and ultimately democratisation of the scientific process. Realising these possibilities requires a vision for augmented AI coupled with a diversity of AI approaches able to deal with fundamental aspects of causality analysis and model discovery while enabling unbiased search across the space of putative explanations. These advances hold the promise to unleash AI's potential for searching and discovering the fundamental structure of our world beyond what human scientists have been able to achieve. Such a vision would push the boundaries of new fundamental science rather than automatize current workflows and instead open doors for technological innovation to tackle some of the greatest challenges facing humanity today.
△ Less
Submitted 29 August, 2023; v1 submitted 9 July, 2023;
originally announced July 2023.
-
CILP: Co-simulation based Imitation Learner for Dynamic Resource Provisioning in Cloud Computing Environments
Authors:
Shreshth Tuli,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
Intelligent Virtual Machine (VM) provisioning is central to cost and resource efficient computation in cloud computing environments. As bootstrap** VMs is time-consuming, a key challenge for latency-critical tasks is to predict future workload demands to provision VMs proactively. However, existing AI-based solutions tend to not holistically consider all crucial aspects such as provisioning over…
▽ More
Intelligent Virtual Machine (VM) provisioning is central to cost and resource efficient computation in cloud computing environments. As bootstrap** VMs is time-consuming, a key challenge for latency-critical tasks is to predict future workload demands to provision VMs proactively. However, existing AI-based solutions tend to not holistically consider all crucial aspects such as provisioning overheads, heterogeneous VM costs and Quality of Service (QoS) of the cloud system. To address this, we propose a novel method, called CILP, that formulates the VM provisioning problem as two sub-problems of prediction and optimization, where the provisioning plan is optimized based on predicted workload demands. CILP leverages a neural network as a surrogate model to predict future workload demands with a co-simulated digital-twin of the infrastructure to compute QoS scores. We extend the neural network to also act as an imitation learner that dynamically decides the optimal VM provisioning plan. A transformer based neural model reduces training and inference overheads while our novel two-phase decision making loop facilitates in making informed provisioning decisions. Crucially, we address limitations of prior work by including resource utilization, deployment costs and provisioning overheads to inform the provisioning decisions in our imitation learning framework. Experiments with three public benchmarks demonstrate that CILP gives up to 22% higher resource utilization, 14% higher QoS scores and 44% lower execution costs compared to the current online and offline optimization based state-of-the-art methods.
△ Less
Submitted 16 April, 2023; v1 submitted 11 February, 2023;
originally announced February 2023.
-
DeepFT: Fault-Tolerant Edge Computing using a Self-Supervised Deep Surrogate Model
Authors:
Shreshth Tuli,
Giuliano Casale,
Ludmila Cherkasova,
Nicholas R. Jennings
Abstract:
The emergence of latency-critical AI applications has been supported by the evolution of the edge computing paradigm. However, edge solutions are typically resource-constrained, posing reliability challenges due to heightened contention for compute and communication capacities and faulty application behavior in the presence of overload conditions. Although a large amount of generated log data can…
▽ More
The emergence of latency-critical AI applications has been supported by the evolution of the edge computing paradigm. However, edge solutions are typically resource-constrained, posing reliability challenges due to heightened contention for compute and communication capacities and faulty application behavior in the presence of overload conditions. Although a large amount of generated log data can be mined for fault prediction, labeling this data for training is a manual process and thus a limiting factor for automation. Due to this, many companies resort to unsupervised fault-tolerance models. Yet, failure models of this kind can incur a loss of accuracy when they need to adapt to non-stationary workloads and diverse host characteristics. To cope with this, we propose a novel modeling approach, called DeepFT, to proactively avoid system overloads and their adverse effects by optimizing the task scheduling and migration decisions. DeepFT uses a deep surrogate model to accurately predict and diagnose faults in the system and co-simulation based self-supervised learning to dynamically adapt the model in volatile settings. It offers a highly scalable solution as the model size scales by only 3 and 1 percent per unit increase in the number of active tasks and hosts. Extensive experimentation on a Raspberry-Pi based edge cluster with DeFog benchmarks shows that DeepFT can outperform state-of-the-art baseline methods in fault-detection and QoS metrics. Specifically, DeepFT gives the highest F1 scores for fault-detection, reducing service deadline violations by up to 37\% while also improving response time by up to 9%.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
DRAGON: Decentralized Fault Tolerance in Edge Federations
Authors:
Shreshth Tuli,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
Edge Federation is a new computing paradigm that seamlessly interconnects the resources of multiple edge service providers. A key challenge in such systems is the deployment of latency-critical and AI based resource-intensive applications in constrained devices. To address this challenge, we propose a novel memory-efficient deep learning based model, namely generative optimization networks (GON).…
▽ More
Edge Federation is a new computing paradigm that seamlessly interconnects the resources of multiple edge service providers. A key challenge in such systems is the deployment of latency-critical and AI based resource-intensive applications in constrained devices. To address this challenge, we propose a novel memory-efficient deep learning based model, namely generative optimization networks (GON). Unlike GANs, GONs use a single network to both discriminate input and generate samples, significantly reducing their memory footprint. Leveraging the low memory footprint of GONs, we propose a decentralized fault-tolerance method called DRAGON that runs simulations (as per a digital modeling twin) to quickly predict and optimize the performance of the edge federation. Extensive experiments with real-world edge computing benchmarks on multiple Raspberry-Pi based federated edge configurations show that DRAGON can outperform the baseline methods in fault-detection and Quality of Service (QoS) metrics. Specifically, the proposed method gives higher F1 scores for fault-detection than the best deep learning (DL) method, while consuming lower memory than the heuristic methods. This allows for improvement in energy consumption, response time and service level agreement violations by up to 74, 63 and 82 percent, respectively.
△ Less
Submitted 16 August, 2022;
originally announced August 2022.
-
AI Augmented Edge and Fog Computing: Trends and Challenges
Authors:
Shreshth Tuli,
Fatemeh Mirhakimi,
Samodha Pallewatta,
Syed Zawad,
Giuliano Casale,
Bahman Javadi,
Feng Yan,
Rajkumar Buyya,
Nicholas R. Jennings
Abstract:
In recent years, the landscape of computing paradigms has witnessed a gradual yet remarkable shift from monolithic computing to distributed and decentralized paradigms such as Internet of Things (IoT), Edge, Fog, Cloud, and Serverless. The frontiers of these computing technologies have been boosted by shift from manually encoded algorithms to Artificial Intelligence (AI)-driven autonomous systems…
▽ More
In recent years, the landscape of computing paradigms has witnessed a gradual yet remarkable shift from monolithic computing to distributed and decentralized paradigms such as Internet of Things (IoT), Edge, Fog, Cloud, and Serverless. The frontiers of these computing technologies have been boosted by shift from manually encoded algorithms to Artificial Intelligence (AI)-driven autonomous systems for optimum and reliable management of distributed computing resources. Prior work focuses on improving existing systems using AI across a wide range of domains, such as efficient resource provisioning, application deployment, task placement, and service management. This survey reviews the evolution of data-driven AI-augmented technologies and their impact on computing systems. We demystify new techniques and draw key insights in Edge, Fog and Cloud resource management-related uses of AI methods and also look at how AI can innovate traditional applications for enhanced Quality of Service (QoS) in the presence of a continuum of resources. We present the latest trends and impact areas such as optimizing AI models that are deployed on or for computing systems. We layout a roadmap for future research directions in areas such as resource management for QoS optimization and service reliability. Finally, we discuss blue-sky ideas and envision this work as an anchor point for future research on AI-driven computing systems.
△ Less
Submitted 14 April, 2023; v1 submitted 1 August, 2022;
originally announced August 2022.
-
MetaNet: Automated Dynamic Selection of Scheduling Policies in Cloud Environments
Authors:
Shreshth Tuli,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
Task scheduling is a well-studied problem in the context of optimizing the Quality of Service (QoS) of cloud computing environments. In order to sustain the rapid growth of computational demands, one of the most important QoS metrics for cloud schedulers is the execution cost. In this regard, several data-driven deep neural networks (DNNs) based schedulers have been proposed in recent years to all…
▽ More
Task scheduling is a well-studied problem in the context of optimizing the Quality of Service (QoS) of cloud computing environments. In order to sustain the rapid growth of computational demands, one of the most important QoS metrics for cloud schedulers is the execution cost. In this regard, several data-driven deep neural networks (DNNs) based schedulers have been proposed in recent years to allow scalable and efficient resource management in dynamic workload settings. However, optimal scheduling frequently relies on sophisticated DNNs with high computational needs implying higher execution costs. Further, even in non-stationary environments, sophisticated schedulers might not always be required and we could briefly rely on low-cost schedulers in the interest of cost-efficiency. Therefore, this work aims to solve the non-trivial meta problem of online dynamic selection of a scheduling policy using a surrogate model called MetaNet. Unlike traditional solutions with a fixed scheduling policy, MetaNet on-the-fly chooses a scheduler from a large set of DNN based methods to optimize task scheduling and execution costs in tandem. Compared to state-of-the-art DNN schedulers, this allows for improvement in execution costs, energy consumption, response time and service level agreement violations by up to 11, 43, 8 and 13 percent, respectively.
△ Less
Submitted 21 May, 2022;
originally announced May 2022.
-
Learning to Dynamically Select Cost Optimal Schedulers in Cloud Computing Environments
Authors:
Shreshth Tuli,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
The operational cost of a cloud computing platform is one of the most significant Quality of Service (QoS) criteria for schedulers, crucial to keep up with the growing computational demands. Several data-driven deep neural network (DNN)-based schedulers have been proposed in recent years that outperform alternative approaches by providing scalable and effective resource management for dynamic work…
▽ More
The operational cost of a cloud computing platform is one of the most significant Quality of Service (QoS) criteria for schedulers, crucial to keep up with the growing computational demands. Several data-driven deep neural network (DNN)-based schedulers have been proposed in recent years that outperform alternative approaches by providing scalable and effective resource management for dynamic workloads. However, state-of-the-art schedulers rely on advanced DNNs with high computational requirements, implying high scheduling costs. In non-stationary contexts, the most sophisticated schedulers may not always be required, and it may be sufficient to rely on low-cost schedulers to temporarily save operational costs. In this work, we propose MetaNet, a surrogate model that predicts the operational costs and scheduling overheads of a large number of DNN-based schedulers and chooses one on-the-fly to jointly optimize job scheduling and execution costs. This facilitates improvements in execution costs, energy usage and service level agreement violations of up to 11%, 43% and 13% compared to the state-of-the-art methods.
△ Less
Submitted 21 May, 2022;
originally announced May 2022.
-
SplitPlace: AI Augmented Splitting and Placement of Large-Scale Neural Networks in Mobile Edge Environments
Authors:
Shreshth Tuli,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
In recent years, deep learning models have become ubiquitous in industry and academia alike. Deep neural networks can solve some of the most complex pattern-recognition problems today, but come with the price of massive compute and memory requirements. This makes the problem of deploying such large-scale neural networks challenging in resource-constrained mobile edge computing platforms, specifica…
▽ More
In recent years, deep learning models have become ubiquitous in industry and academia alike. Deep neural networks can solve some of the most complex pattern-recognition problems today, but come with the price of massive compute and memory requirements. This makes the problem of deploying such large-scale neural networks challenging in resource-constrained mobile edge computing platforms, specifically in mission-critical domains like surveillance and healthcare. To solve this, a promising solution is to split resource-hungry neural networks into lightweight disjoint smaller components for pipelined distributed processing. At present, there are two main approaches to do this: semantic and layer-wise splitting. The former partitions a neural network into parallel disjoint models that produce a part of the result, whereas the latter partitions into sequential models that produce intermediate results. However, there is no intelligent algorithm that decides which splitting strategy to use and places such modular splits to edge nodes for optimal performance. To combat this, this work proposes a novel AI-driven online policy, SplitPlace, that uses Multi-Armed-Bandits to intelligently decide between layer and semantic splitting strategies based on the input task's service deadline demands. SplitPlace places such neural network split fragments on mobile edge devices using decision-aware reinforcement learning for efficient and scalable computing. Moreover, SplitPlace fine-tunes its placement engine to adapt to volatile environments. Our experiments on physical mobile-edge environments with real-world workloads show that SplitPlace can significantly improve the state-of-the-art in terms of average response time, deadline violation rate, inference accuracy, and total reward by up to 46, 69, 3 and 12 percent respectively.
△ Less
Submitted 21 May, 2022;
originally announced May 2022.
-
CAROL: Confidence-Aware Resilience Model for Edge Federations
Authors:
Shreshth Tuli,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
In recent years, the deployment of large-scale Internet of Things (IoT) applications has given rise to edge federations that seamlessly interconnect and leverage resources from multiple edge service providers. The requirement of supporting both latency-sensitive and compute-intensive IoT tasks necessitates service resilience, especially for the broker nodes in typical broker-worker deployment desi…
▽ More
In recent years, the deployment of large-scale Internet of Things (IoT) applications has given rise to edge federations that seamlessly interconnect and leverage resources from multiple edge service providers. The requirement of supporting both latency-sensitive and compute-intensive IoT tasks necessitates service resilience, especially for the broker nodes in typical broker-worker deployment designs. Existing fault-tolerance or resilience schemes often lack robustness and generalization capability in non-stationary workload settings. This is typically due to the expensive periodic fine-tuning of models required to adapt them in dynamic scenarios. To address this, we present a confidence aware resilience model, CAROL, that utilizes a memory-efficient generative neural network to predict the Quality of Service (QoS) for a future state and a confidence score for each prediction. Thus, whenever a broker fails, we quickly recover the system by executing a local-search over the broker-worker topology space and optimize future QoS. The confidence score enables us to keep track of the prediction performance and run parsimonious neural network fine-tuning to avoid excessive overheads, further improving the QoS of the system. Experiments on a Raspberry-Pi based edge testbed with IoT benchmark applications show that CAROL outperforms state-of-the-art resilience schemes by reducing the energy consumption, deadline violation rates and resilience overheads by up to 16, 17 and 36 percent, respectively.
△ Less
Submitted 14 March, 2022;
originally announced March 2022.
-
TranAD: Deep Transformer Networks for Anomaly Detection in Multivariate Time Series Data
Authors:
Shreshth Tuli,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
Efficient anomaly detection and diagnosis in multivariate time-series data is of great importance for modern industrial applications. However, building a system that is able to quickly and accurately pinpoint anomalous observations is a challenging problem. This is due to the lack of anomaly labels, high data volatility and the demands of ultra-low inference times in modern applications. Despite t…
▽ More
Efficient anomaly detection and diagnosis in multivariate time-series data is of great importance for modern industrial applications. However, building a system that is able to quickly and accurately pinpoint anomalous observations is a challenging problem. This is due to the lack of anomaly labels, high data volatility and the demands of ultra-low inference times in modern applications. Despite the recent developments of deep learning approaches for anomaly detection, only a few of them can address all of these challenges. In this paper, we propose TranAD, a deep transformer network based anomaly detection and diagnosis model which uses attention-based sequence encoders to swiftly perform inference with the knowledge of the broader temporal trends in the data. TranAD uses focus score-based self-conditioning to enable robust multi-modal feature extraction and adversarial training to gain stability. Additionally, model-agnostic meta learning (MAML) allows us to train the model using limited data. Extensive empirical studies on six publicly available datasets demonstrate that TranAD can outperform state-of-the-art baseline methods in detection and diagnosis performance with data and time-efficient training. Specifically, TranAD increases F1 scores by up to 17%, reducing training times by up to 99% compared to the baselines.
△ Less
Submitted 14 May, 2022; v1 submitted 18 January, 2022;
originally announced January 2022.
-
GOSH: Task Scheduling Using Deep Surrogate Models in Fog Computing Environments
Authors:
Shreshth Tuli,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
Recently, intelligent scheduling approaches using surrogate models have been proposed to efficiently allocate volatile tasks in heterogeneous fog environments. Advances like deterministic surrogate models, deep neural networks (DNN) and gradient-based optimization allow low energy consumption and response times to be reached. However, deterministic surrogate models, which estimate objective values…
▽ More
Recently, intelligent scheduling approaches using surrogate models have been proposed to efficiently allocate volatile tasks in heterogeneous fog environments. Advances like deterministic surrogate models, deep neural networks (DNN) and gradient-based optimization allow low energy consumption and response times to be reached. However, deterministic surrogate models, which estimate objective values for optimization, do not consider the uncertainties in the distribution of the Quality of Service (QoS) objective function that can lead to high Service Level Agreement (SLA) violation rates. Moreover, the brittle nature of DNN training and prevent such models from reaching minimal energy or response times. To overcome these difficulties, we present a novel scheduler: GOSH i.e. Gradient Based Optimization using Second Order derivatives and Heteroscedastic Deep Surrogate Models. GOSH uses a second-order gradient based optimization approach to obtain better QoS and reduce the number of iterations to converge to a scheduling decision, subsequently lowering the scheduling time. Instead of a vanilla DNN, GOSH uses a Natural Parameter Network to approximate objective scores. Further, a Lower Confidence Bound optimization approach allows GOSH to find an optimal trade-off between greedy minimization of the mean latency and uncertainty reduction by employing error-based exploration. Thus, GOSH and its co-simulation based extension GOSH*, can adapt quickly and reach better objective scores than baseline methods. We show that GOSH* reaches better objective scores than GOSH, but it is suitable only for high resource availability settings, whereas GOSH is apt for limited resource settings. Real system experiments for both GOSH and GOSH* show significant improvements against the state-of-the-art in terms of energy consumption, response time and SLA violations by up to 18, 27 and 82 percent, respectively.
△ Less
Submitted 16 December, 2021;
originally announced December 2021.
-
MCDS: AI Augmented Workflow Scheduling in Mobile Edge Cloud Computing Systems
Authors:
Shreshth Tuli,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
Workflow scheduling is a long-studied problem in parallel and distributed computing (PDC), aiming to efficiently utilize compute resources to meet user's service requirements. Recently proposed scheduling methods leverage the low response times of edge computing platforms to optimize application Quality of Service (QoS). However, scheduling workflow applications in mobile edge-cloud systems is cha…
▽ More
Workflow scheduling is a long-studied problem in parallel and distributed computing (PDC), aiming to efficiently utilize compute resources to meet user's service requirements. Recently proposed scheduling methods leverage the low response times of edge computing platforms to optimize application Quality of Service (QoS). However, scheduling workflow applications in mobile edge-cloud systems is challenging due to computational heterogeneity, changing latencies of mobile devices and the volatile nature of workload resource requirements. To overcome these difficulties, it is essential, but at the same time challenging, to develop a long-sighted optimization scheme that efficiently models the QoS objectives. In this work, we propose MCDS: Monte Carlo Learning using Deep Surrogate Models to efficiently schedule workflow applications in mobile edge-cloud computing systems. MCDS is an Artificial Intelligence (AI) based scheduling approach that uses a tree-based search strategy and a deep neural network-based surrogate model to estimate the long-term QoS impact of immediate actions for robust optimization of scheduling decisions. Experiments on physical and simulated edge-cloud testbeds show that MCDS can improve over the state-of-the-art methods in terms of energy consumption, response time, SLA violations and cost by at least 6.13, 4.56, 45.09 and 30.71 percent respectively.
△ Less
Submitted 14 December, 2021;
originally announced December 2021.
-
PreGAN: Preemptive Migration Prediction Network for Proactive Fault-Tolerant Edge Computing
Authors:
Shreshth Tuli,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
Building a fault-tolerant edge system that can quickly react to node overloads or failures is challenging due to the unreliability of edge devices and the strict service deadlines of modern applications. Moreover, unnecessary task migrations can stress the system network, giving rise to the need for a smart and parsimonious failure recovery scheme. Prior approaches often fail to adapt to highly vo…
▽ More
Building a fault-tolerant edge system that can quickly react to node overloads or failures is challenging due to the unreliability of edge devices and the strict service deadlines of modern applications. Moreover, unnecessary task migrations can stress the system network, giving rise to the need for a smart and parsimonious failure recovery scheme. Prior approaches often fail to adapt to highly volatile workloads or accurately detect and diagnose faults for optimal remediation. There is thus a need for a robust and proactive fault-tolerance mechanism to meet service level objectives. In this work, we propose PreGAN, a composite AI model using a Generative Adversarial Network (GAN) to predict preemptive migration decisions for proactive fault-tolerance in containerized edge deployments. PreGAN uses co-simulations in tandem with a GAN to learn a few-shot anomaly classifier and proactively predict migration decisions for reliable computing. Extensive experiments on a Raspberry-Pi based edge environment show that PreGAN can outperform state-of-the-art baseline methods in fault-detection, diagnosis and classification, thus achieving high quality of service. PreGAN accomplishes this by 5.1% more accurate fault detection, higher diagnosis scores and 23.8% lower overheads compared to the best method among the considered baselines.
△ Less
Submitted 4 December, 2021;
originally announced December 2021.
-
START: Straggler Prediction and Mitigation for Cloud Computing Environments using Encoder LSTM Networks
Authors:
Shreshth Tuli,
Sukhpal Singh Gill,
Peter Garraghan,
Rajkumar Buyya,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
Modern large-scale computing systems distribute jobs into multiple smaller tasks which execute in parallel to accelerate job completion rates and reduce energy consumption. However, a common performance problem in such systems is dealing with straggler tasks that are slow running instances that increase the overall response time. Such tasks can significantly impact the system's Quality of Service…
▽ More
Modern large-scale computing systems distribute jobs into multiple smaller tasks which execute in parallel to accelerate job completion rates and reduce energy consumption. However, a common performance problem in such systems is dealing with straggler tasks that are slow running instances that increase the overall response time. Such tasks can significantly impact the system's Quality of Service (QoS) and the Service Level Agreements (SLA). To combat this issue, there is a need for automatic straggler detection and mitigation mechanisms that execute jobs without violating the SLA. Prior work typically builds reactive models that focus first on detection and then mitigation of straggler tasks, which leads to delays. Other works use prediction based proactive mechanisms, but ignore heterogeneous host or volatile task characteristics. In this paper, we propose a Straggler Prediction and Mitigation Technique (START) that is able to predict which tasks might be stragglers and dynamically adapt scheduling to achieve lower response times. Our technique analyzes all tasks and hosts based on compute and network resource consumption using an Encoder Long-Short-Term-Memory (LSTM) network. The output of this network is then used to predict and mitigate expected straggler tasks. This reduces the SLA violation rate and execution time without compromising QoS. Specifically, we use the CloudSim toolkit to simulate START in a cloud environment and compare it with state-of-the-art techniques (IGRU-SD, SGC, Dolly, GRASS, NearestFit and Wrangler) in terms of QoS parameters such as energy consumption, execution time, resource contention, CPU utilization and SLA violation rate. Experiments show that START reduces execution time, resource contention, energy and SLA violations by 13%, 11%, 16% and 19%, respectively, compared to the state-of-the-art approaches.
△ Less
Submitted 19 November, 2021;
originally announced November 2021.
-
Optimal Auction Design for the Gradual Procurement of Strategic Service Provider Agents
Authors:
Farzaneh Farhadi,
Maria Chli,
Nicholas R. Jennings
Abstract:
We consider an outsourcing problem where a software agent procures multiple services from providers with uncertain reliabilities to complete a computational task before a strict deadline. The service consumer requires a procurement strategy that achieves the optimal balance between success probability and invocation cost. However, the service providers are self-interested and may misrepresent thei…
▽ More
We consider an outsourcing problem where a software agent procures multiple services from providers with uncertain reliabilities to complete a computational task before a strict deadline. The service consumer requires a procurement strategy that achieves the optimal balance between success probability and invocation cost. However, the service providers are self-interested and may misrepresent their private cost information if it benefits them. For such settings, we design a novel procurement auction that provides the consumer with the highest possible revenue, while giving sufficient incentives to providers to tell the truth about their costs. This auction creates a contingent plan for gradual service procurement that suggests recruiting a new provider only when the success probability of the already hired providers drops below a time-dependent threshold. To make this auction incentive compatible, we propose a novel weighted threshold payment scheme which pays the minimum among all truthful mechanisms. Using the weighted payment scheme, we also design a low-complexity near-optimal auction that reduces the computational complexity of the optimal mechanism by 99% with only marginal performance loss (less than 1%). We demonstrate the effectiveness and strength of our proposed auctions through both game theoretical and numerical analysis. The experiment results confirm that the proposed auctions exhibit 59% improvement in performance over the current state-of-the-art, by increasing success probability up to 79% and reducing invocation cost by up to 11%.
△ Less
Submitted 25 October, 2021;
originally announced October 2021.
-
HUNTER: AI based Holistic Resource Management for Sustainable Cloud Computing
Authors:
Shreshth Tuli,
Sukhpal Singh Gill,
Minxian Xu,
Peter Garraghan,
Rami Bahsoon,
Schahram Dustdar,
Rizos Sakellariou,
Omer Rana,
Rajkumar Buyya,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
The worldwide adoption of cloud data centers (CDCs) has given rise to the ubiquitous demand for hosting application services on the cloud. Further, contemporary data-intensive industries have seen a sharp upsurge in the resource requirements of modern applications. This has led to the provisioning of an increased number of cloud servers, giving rise to higher energy consumption and, consequently,…
▽ More
The worldwide adoption of cloud data centers (CDCs) has given rise to the ubiquitous demand for hosting application services on the cloud. Further, contemporary data-intensive industries have seen a sharp upsurge in the resource requirements of modern applications. This has led to the provisioning of an increased number of cloud servers, giving rise to higher energy consumption and, consequently, sustainability concerns. Traditional heuristics and reinforcement learning based algorithms for energy-efficient cloud resource management address the scalability and adaptability related challenges to a limited extent. Existing work often fails to capture dependencies across thermal characteristics of hosts, resource consumption of tasks and the corresponding scheduling decisions. This leads to poor scalability and an increase in the compute resource requirements, particularly in environments with non-stationary resource demands. To address these limitations, we propose an artificial intelligence (AI) based holistic resource management technique for sustainable cloud computing called HUNTER. The proposed model formulates the goal of optimizing energy efficiency in data centers as a multi-objective scheduling problem, considering three important models: energy, thermal and cooling. HUNTER utilizes a Gated Graph Convolution Network as a surrogate model for approximating the Quality of Service (QoS) for a system state and generating optimal scheduling decisions. Experiments on simulated and physical cloud environments using the CloudSim toolkit and the COSCO framework show that HUNTER outperforms state-of-the-art baselines in terms of energy consumption, SLA violation, scheduling time, cost and temperature by up to 12, 35, 43, 54 and 3 percent respectively.
△ Less
Submitted 28 October, 2021; v1 submitted 11 October, 2021;
originally announced October 2021.
-
Generative Optimization Networks for Memory Efficient Data Generation
Authors:
Shreshth Tuli,
Shikhar Tuli,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
In standard generative deep learning models, such as autoencoders or GANs, the size of the parameter set is proportional to the complexity of the generated data distribution. A significant challenge is to deploy resource-hungry deep learning models in devices with limited memory to prevent system upgrade costs. To combat this, we propose a novel framework called generative optimization networks (G…
▽ More
In standard generative deep learning models, such as autoencoders or GANs, the size of the parameter set is proportional to the complexity of the generated data distribution. A significant challenge is to deploy resource-hungry deep learning models in devices with limited memory to prevent system upgrade costs. To combat this, we propose a novel framework called generative optimization networks (GON) that is similar to GANs, but does not use a generator, significantly reducing its memory footprint. GONs use a single discriminator network and run optimization in the input space to generate new data samples, achieving an effective compromise between training time and memory consumption. GONs are most suited for data generation problems in limited memory settings. Here we illustrate their use for the problem of anomaly detection in memory-constrained edge devices arising from attacks or intrusion events. Specifically, we use a GON to calculate a reconstruction-based anomaly score for input time-series windows. Experiments on a Raspberry-Pi testbed with two existing and a new suite of datasets show that our framework gives up to 32% higher detection F1 scores and 58% lower memory consumption, with only 5% higher training overheads compared to the state-of-the-art.
△ Less
Submitted 28 October, 2021; v1 submitted 6 October, 2021;
originally announced October 2021.
-
COSCO: Container Orchestration using Co-Simulation and Gradient Based Optimization for Fog Computing Environments
Authors:
Shreshth Tuli,
Shivananda Poojara,
Satish N. Srirama,
Giuliano Casale,
Nicholas R. Jennings
Abstract:
Intelligent task placement and management of tasks in large-scale fog platforms is challenging due to the highly volatile nature of modern workload applications and sensitive user requirements of low energy consumption and response time. Container orchestration platforms have emerged to alleviate this problem with prior art either using heuristics to quickly reach scheduling decisions or AI driven…
▽ More
Intelligent task placement and management of tasks in large-scale fog platforms is challenging due to the highly volatile nature of modern workload applications and sensitive user requirements of low energy consumption and response time. Container orchestration platforms have emerged to alleviate this problem with prior art either using heuristics to quickly reach scheduling decisions or AI driven methods like reinforcement learning and evolutionary approaches to adapt to dynamic scenarios. The former often fail to quickly adapt in highly dynamic environments, whereas the latter have run-times that are slow enough to negatively impact response time. Therefore, there is a need for scheduling policies that are both reactive to work efficiently in volatile environments and have low scheduling overheads. To achieve this, we propose a Gradient Based Optimization Strategy using Back-propagation of gradients with respect to Input (GOBI). Further, we leverage the accuracy of predictive digital-twin models and simulation capabilities by develo** a Coupled Simulation and Container Orchestration Framework (COSCO). Using this, we create a hybrid simulation driven decision approach, GOBI*, to optimize Quality of Service (QoS) parameters. Co-simulation and the back-propagation approaches allow these methods to adapt quickly in volatile environments. Experiments conducted using real-world data on fog applications using the GOBI and GOBI* methods, show a significant improvement in terms of energy consumption, response time, Service Level Objective and scheduling time by up to 15, 40, 4, and 82 percent respectively when compared to the state-of-the-art algorithms.
△ Less
Submitted 9 July, 2021; v1 submitted 29 April, 2021;
originally announced April 2021.
-
GENNI: Visualising the Geometry of Equivalences for Neural Network Identifiability
Authors:
Daniel Lengyel,
Janith Petangoda,
Isak Falk,
Kate Highnam,
Michalis Lazarou,
Arinbjörn Kolbeinsson,
Marc Peter Deisenroth,
Nicholas R. Jennings
Abstract:
We propose an efficient algorithm to visualise symmetries in neural networks. Typically, models are defined with respect to a parameter space, where non-equal parameters can produce the same input-output map. Our proposed method, GENNI, allows us to efficiently identify parameters that are functionally equivalent and then visualise the subspace of the resulting equivalence class. By doing so, we a…
▽ More
We propose an efficient algorithm to visualise symmetries in neural networks. Typically, models are defined with respect to a parameter space, where non-equal parameters can produce the same input-output map. Our proposed method, GENNI, allows us to efficiently identify parameters that are functionally equivalent and then visualise the subspace of the resulting equivalence class. By doing so, we are now able to better explore questions surrounding identifiability, with applications to optimisation and generalizability, for commonly used or newly developed neural network architectures.
△ Less
Submitted 14 November, 2020;
originally announced November 2020.
-
On Population-Based Algorithms for Distributed Constraint Optimization Problems
Authors:
Saaduddin Mahmud,
Md. Mosaddek Khan,
Nicholas R. Jennings
Abstract:
Distributed Constraint Optimization Problems (DCOPs) are a widely studied class of optimization problems in which interaction between a set of cooperative agents are modeled as a set of constraints. DCOPs are NP-hard and significant effort has been devoted to develo** methods for finding incomplete solutions. In this paper, we study an emerging class of such incomplete algorithms that are broadl…
▽ More
Distributed Constraint Optimization Problems (DCOPs) are a widely studied class of optimization problems in which interaction between a set of cooperative agents are modeled as a set of constraints. DCOPs are NP-hard and significant effort has been devoted to develo** methods for finding incomplete solutions. In this paper, we study an emerging class of such incomplete algorithms that are broadly termed as population-based algorithms. The main characteristic of these algorithms is that they maintain a population of candidate solutions of a given problem and use this population to cover a large area of the search space and to avoid local-optima. In recent years, this class of algorithms has gained significant attention due to their ability to produce high-quality incomplete solutions. With the primary goal of further improving the quality of solutions compared to the state-of-the-art incomplete DCOP algorithms, we present two new population-based algorithms in this paper. Our first approach, Anytime Evolutionary DCOP or AED, exploits evolutionary optimization meta-heuristics to solve DCOPs. We also present a novel anytime update mechanism that gives AED its anytime property. While in our second contribution, we show that population-based approaches can be combined with local search approaches. Specifically, we develop an algorithm called DPSA based on the Simulated Annealing meta-heuristic. We empirically evaluate these two algorithms to illustrate their respective effectiveness in different settings against the state-of-the-art incomplete DCOP algorithms including all existing population-based algorithms in a wide variety of benchmarks. Our evaluation shows AED and DPSA markedly outperform the state-of-the-art and produce up to 75% improved solutions.
△ Less
Submitted 2 September, 2020;
originally announced September 2020.
-
Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning
Authors:
Kate Highnam,
Domenic Puzio,
Song Luo,
Nicholas R. Jennings
Abstract:
Botnets and malware continue to avoid detection by static rules engines when using domain generation algorithms (DGAs) for callouts to unique, dynamically generated web addresses. Common DGA detection techniques fail to reliably detect DGA variants that combine random dictionary words to create domain names that closely mirror legitimate domains. To combat this, we created a novel hybrid neural ne…
▽ More
Botnets and malware continue to avoid detection by static rules engines when using domain generation algorithms (DGAs) for callouts to unique, dynamically generated web addresses. Common DGA detection techniques fail to reliably detect DGA variants that combine random dictionary words to create domain names that closely mirror legitimate domains. To combat this, we created a novel hybrid neural network, Bilbo the `bagging` model, that analyses domains and scores the likelihood they are generated by such algorithms and therefore are potentially malicious. Bilbo is the first parallel usage of a convolutional neural network (CNN) and a long short-term memory (LSTM) network for DGA detection. Our unique architecture is found to be the most consistent in performance in terms of AUC, F1 score, and accuracy when generalising across different dictionary DGA classification tasks compared to current state-of-the-art deep learning architectures. We validate using reverse-engineered dictionary DGA domains and detail our real-time implementation strategy for scoring real-world network logs within a large financial enterprise. In four hours of actual network traffic, the model discovered at least five potential command-and-control networks that commercial vendor tools did not flag.
△ Less
Submitted 28 March, 2020;
originally announced March 2020.
-
Learning Optimal Temperature Region for Solving Mixed Integer Functional DCOPs
Authors:
Saaduddin Mahmud,
Md. Mosaddek Khan,
Moumita Choudhury,
Long Tran-Thanh,
Nicholas R. Jennings
Abstract:
Distributed Constraint Optimization Problems (DCOPs) are an important framework for modeling coordinated decision-making problems in multi-agent systems with a set of discrete variables. Later works have extended DCOPs to model problems with a set of continuous variables, named Functional DCOPs (F-DCOPs). In this paper, we combine both of these frameworks into the Mixed Integer Functional DCOP (MI…
▽ More
Distributed Constraint Optimization Problems (DCOPs) are an important framework for modeling coordinated decision-making problems in multi-agent systems with a set of discrete variables. Later works have extended DCOPs to model problems with a set of continuous variables, named Functional DCOPs (F-DCOPs). In this paper, we combine both of these frameworks into the Mixed Integer Functional DCOP (MIF-DCOP) framework that can deal with problems regardless of their variables' type. We then propose a novel algorithm $-$ Distributed Parallel Simulated Annealing (DPSA), where agents cooperatively learn the optimal parameter configuration for the algorithm while also solving the given problem using the learned knowledge. Finally, we empirically evaluate our approach in DCOP, F-DCOP, and MIF-DCOP settings and show that DPSA produces solutions of significantly better quality than the state-of-the-art non-exact algorithms in their corresponding settings.
△ Less
Submitted 2 September, 2020; v1 submitted 27 February, 2020;
originally announced February 2020.
-
Streaming Bayesian Inference for Crowdsourced Classification
Authors:
Edoardo Manino,
Long Tran-Thanh,
Nicholas R. Jennings
Abstract:
A key challenge in crowdsourcing is inferring the ground truth from noisy and unreliable data. To do so, existing approaches rely on collecting redundant information from the crowd, and aggregating it with some probabilistic method. However, oftentimes such methods are computationally inefficient, are restricted to some specific settings, or lack theoretical guarantees. In this paper, we revisit t…
▽ More
A key challenge in crowdsourcing is inferring the ground truth from noisy and unreliable data. To do so, existing approaches rely on collecting redundant information from the crowd, and aggregating it with some probabilistic method. However, oftentimes such methods are computationally inefficient, are restricted to some specific settings, or lack theoretical guarantees. In this paper, we revisit the problem of binary classification from crowdsourced data. Specifically we propose Streaming Bayesian Inference for Crowdsourcing (SBIC), a new algorithm that does not suffer from any of these limitations. First, SBIC has low complexity and can be used in a real-time online setting. Second, SBIC has the same accuracy as the best state-of-the-art algorithms in all settings. Third, SBIC has provable asymptotic guarantees both in the online and offline settings.
△ Less
Submitted 13 November, 2019;
originally announced November 2019.
-
AED: An Anytime Evolutionary DCOP Algorithm
Authors:
Saaduddin Mahmud,
Moumita Choudhury,
Md. Mosaddek Khan,
Long Tran-Thanh,
Nicholas R. Jennings
Abstract:
Evolutionary optimization is a generic population-based metaheuristic that can be adapted to solve a wide variety of optimization problems and has proven very effective for combinatorial optimization problems. However, the potential of this metaheuristic has not been utilized in Distributed Constraint Optimization Problems (DCOPs), a well-known class of combinatorial optimization problems prevalen…
▽ More
Evolutionary optimization is a generic population-based metaheuristic that can be adapted to solve a wide variety of optimization problems and has proven very effective for combinatorial optimization problems. However, the potential of this metaheuristic has not been utilized in Distributed Constraint Optimization Problems (DCOPs), a well-known class of combinatorial optimization problems prevalent in Multi-Agent Systems. In this paper, we present a novel population-based algorithm, Anytime Evolutionary DCOP (AED), that uses evolutionary optimization to solve DCOPs. In AED, the agents cooperatively construct an initial set of random solutions and gradually improve them through a new mechanism that considers an optimistic approximation of local benefits. Moreover, we present a new anytime update mechanism for AED that identifies the best among a distributed set of candidate solutions and notifies all the agents when a new best is found. In our theoretical analysis, we prove that AED is anytime. Finally, we present empirical results indicating AED outperforms the state-of-the-art DCOP algorithms in terms of solution quality.
△ Less
Submitted 2 September, 2020; v1 submitted 13 September, 2019;
originally announced September 2019.
-
Social Cost Guarantees in Smart Route Guidance
Authors:
Paolo Serafino,
Carmine Ventre,
Long Tran-Thanh,
Jie Zhang,
Bo An,
Nick Jennings
Abstract:
We model and study the problem of assigning traffic in an urban road network infrastructure. In our model, each driver submits their intended destination and is assigned a route to follow that minimizes the social cost (i.e., travel distance of all the drivers). We assume drivers are strategic and try to manipulate the system (i.e., misreport their intended destination and/or deviate from the assi…
▽ More
We model and study the problem of assigning traffic in an urban road network infrastructure. In our model, each driver submits their intended destination and is assigned a route to follow that minimizes the social cost (i.e., travel distance of all the drivers). We assume drivers are strategic and try to manipulate the system (i.e., misreport their intended destination and/or deviate from the assigned route) if they can reduce their travel distance by doing so. Such strategic behavior is highly undesirable as it can lead to an overall suboptimal traffic assignment and cause congestion. To alleviate this problem, we develop moneyless mechanisms that are resilient to manipulation by the agents and offer provable approximation guarantees on the social cost obtained by the solution. We then empirically test the mechanisms studied in the paper, showing that they can be effectively used in practice in order to compute manipulation resistant traffic allocations.
△ Less
Submitted 15 June, 2019;
originally announced June 2019.
-
Selling Multiple Items via Social Networks
Authors:
Dengji Zhao,
Bin Li,
Jun** Xu,
Dong Hao,
Nicholas R. Jennings
Abstract:
We consider a market where a seller sells multiple units of a commodity in a social network. Each node/buyer in the social network can only directly communicate with her neighbours, i.e. the seller can only sell the commodity to her neighbours if she could not find a way to inform other buyers. In this paper, we design a novel promotion mechanism that incentivizes all buyers, who are aware of the…
▽ More
We consider a market where a seller sells multiple units of a commodity in a social network. Each node/buyer in the social network can only directly communicate with her neighbours, i.e. the seller can only sell the commodity to her neighbours if she could not find a way to inform other buyers. In this paper, we design a novel promotion mechanism that incentivizes all buyers, who are aware of the sale, to invite all their neighbours to join the sale, even though there is no guarantee that their efforts will be paid. While traditional sale promotions such as sponsored search auctions cannot guarantee a positive return for the advertiser (the seller), our mechanism guarantees that the seller's revenue is better than not using the advertising. More importantly, the seller does not need to pay if the advertising is not beneficial to her.
△ Less
Submitted 6 March, 2019;
originally announced March 2019.
-
Estimates for a DM $\rightarrow a \rightarrow γ$ 3.55 keV line in the radio lobes of Centaurus A
Authors:
Nicholas Jennings
Abstract:
The origin of the 3.55 keV excess reported in various galaxies and galaxy clusters remains unknown. Non-observations of the line in dwarf spheroidal galaxies (dSphs) create tension with galaxy cluster observations when considering a direct Dark Matter (DM) $\rightarrow γ$ decay. This discrepancy could be explained by a DM $\rightarrow a \rightarrow γ$ decay, where the DM particles decay to axion-l…
▽ More
The origin of the 3.55 keV excess reported in various galaxies and galaxy clusters remains unknown. Non-observations of the line in dwarf spheroidal galaxies (dSphs) create tension with galaxy cluster observations when considering a direct Dark Matter (DM) $\rightarrow γ$ decay. This discrepancy could be explained by a DM $\rightarrow a \rightarrow γ$ decay, where the DM particles decay to axion-like particles (ALPs), which then convert to photons in a magnetic field. The 3.55 keV line from a decay to ALPs therefore has very different morphology from a direct decay to photons, as it would only appear in environments with substantial magnetic fields between the source and us. To test this hypothesis we consider targets where the line strength would be enhanced compared to the DM $\rightarrow γ$ model. The giant lobes of radio galaxies could represent good environments, having magnetic fields with strength $\mathcal{O}(μ\rm{G})$ that extend for hundreds of kiloparsecs, and minimal X-ray background. In the case of Centaurus A, a large population of dSphs are associated with the galaxy, some of which are potentially in or behind its lobes. In this paper we estimate the flux of a 3.55 keV DM $\rightarrow a \rightarrow γ$ line from these sources, and compare it to the flux from the DM halo of Centaurus~A. We comment on the potential to detect such a signal with current satellites (such as XMM-Newton and Chandra) and future satellites (such as Athena).
△ Less
Submitted 1 December, 2017;
originally announced December 2017.
-
Searches for Axion-Like Particles with NGC1275: Current and Future Bounds
Authors:
Nicholas Jennings
Abstract:
Galaxy clusters contain large magnetic fields that make them excellent targets to search for ultralight Axion-Like Particles (ALPs). ALP-photon interconversion imprints quasi-sinusoidal oscillations on the X-ray spectra of point sources in or behind the cluster. The absence of substantial oscillations allows us to place bounds on $g_{a γγ}$. Here the bounds from the {\it Chandra} X-ray observation…
▽ More
Galaxy clusters contain large magnetic fields that make them excellent targets to search for ultralight Axion-Like Particles (ALPs). ALP-photon interconversion imprints quasi-sinusoidal oscillations on the X-ray spectra of point sources in or behind the cluster. The absence of substantial oscillations allows us to place bounds on $g_{a γγ}$. Here the bounds from the {\it Chandra} X-ray observations of NGC1275 are presented, as well as those predicted for the {\it Athena} X-ray observatory, due to launch in 2028.
△ Less
Submitted 6 November, 2017;
originally announced November 2017.
-
Projected bounds on ALPs from Athena
Authors:
Joseph P. Conlon,
Francesca Day,
Nicholas Jennings,
Sven Krippendorf,
Francesco Muia
Abstract:
Galaxy clusters represent excellent laboratories to search for Axion-Like Particles (ALPs). They contain magnetic fields which can induce quasi-sinusoidal oscillations in the X-ray spectra of AGNs situated in or behind them. Due to its excellent energy resolution, the X-ray Integral Field Unit (X-IFU) instrument onboard the Athena X-ray Observatory will be far more sensitive to ALP-induced modulat…
▽ More
Galaxy clusters represent excellent laboratories to search for Axion-Like Particles (ALPs). They contain magnetic fields which can induce quasi-sinusoidal oscillations in the X-ray spectra of AGNs situated in or behind them. Due to its excellent energy resolution, the X-ray Integral Field Unit (X-IFU) instrument onboard the Athena X-ray Observatory will be far more sensitive to ALP-induced modulations than current detectors. As a first analysis of the sensitivity of Athena to the ALP-photon coupling $g_{a γγ}$, we simulate observations of the Seyfert galaxy NGC1275 in the Perseus cluster using the SIXTE simulation software. We estimate that for a 200ks exposure, a non-observation of spectral modulations will constrain ${g_{aγγ}\lesssim1.5\times10^{-13}\rm{GeV}^{-1}}$ for $m_a \lesssim 10^{-12} \rm{eV}$, representing an order of magnitude improvement over constraints derived using the current generation of satellites.
△ Less
Submitted 4 December, 2017; v1 submitted 1 July, 2017;
originally announced July 2017.
-
Constraints on Axion-Like Particles from Non-Observation of Spectral Modulations for X-ray Point Sources
Authors:
Joseph P. Conlon,
Francesca Day,
Nicholas Jennings,
Sven Krippendorf,
Markus Rummel
Abstract:
We extend previous searches for X-ray spectral modulations induced by ALP-photon conversion to a variety of new sources, all consisting of quasars or AGNs located in or behind galaxy clusters. We consider a total of seven new sources, with data drawn from the Chandra archive. In all cases the spectrum is well fit by an absorbed power-law with no evidence for spectral modulations, allowing constrai…
▽ More
We extend previous searches for X-ray spectral modulations induced by ALP-photon conversion to a variety of new sources, all consisting of quasars or AGNs located in or behind galaxy clusters. We consider a total of seven new sources, with data drawn from the Chandra archive. In all cases the spectrum is well fit by an absorbed power-law with no evidence for spectral modulations, allowing constraints to be placed on the ALP-photon coupling parameter $g_{aγγ}$. Two sources are particularly good: the Seyfert galaxy 2E3140 in A1795 and the AGN NGC3862 within the cluster A1367, leading to 95\% bounds for light ALPs ($m_a \lesssim 10^{-12} {\rm eV}$) of $g_{aγγ} \lesssim 1.5 \times 10^{-12} {\rm GeV}^{-1}$ and $g_{aγγ} \lesssim 2.4 \times 10^{-12} {\rm GeV}^{-1}$ respectively.
△ Less
Submitted 18 April, 2017;
originally announced April 2017.
-
Efficiency of active learning for the allocation of workers on crowdsourced classification tasks
Authors:
Edoardo Manino,
Long Tran-Thanh,
Nicholas R. Jennings
Abstract:
Crowdsourcing has been successfully employed in the past as an effective and cheap way to execute classification tasks and has therefore attracted the attention of the research community. However, we still lack a theoretical understanding of how to collect the labels from the crowd in an optimal way. In this paper we focus on the problem of worker allocation and compare two active learning policie…
▽ More
Crowdsourcing has been successfully employed in the past as an effective and cheap way to execute classification tasks and has therefore attracted the attention of the research community. However, we still lack a theoretical understanding of how to collect the labels from the crowd in an optimal way. In this paper we focus on the problem of worker allocation and compare two active learning policies proposed in the empirical literature with a uniform allocation of the available budget. To this end we make a thorough mathematical analysis of the problem and derive a new bound on the performance of the system. Furthermore we run extensive simulations in a more realistic scenario and show that our theoretical results hold in practice.
△ Less
Submitted 19 October, 2016;
originally announced October 2016.
-
Incentive Engineering Framework for Crowdsourcing Systems
Authors:
Nhat V. Q. Truong,
Sebastian Stein,
Long Tran-Thanh,
Nicholas R. Jennings
Abstract:
Significant effort has been made to understand user motivation and to elicit user participation in crowdsourcing systems. However, incentive engineering, i.e., designing incentives that can purposefully motivate users, is still an open question and remains one of the key challenges of crowdsourcing initiatives. In this work in progress, we propose a general and systematic incentive engineering fra…
▽ More
Significant effort has been made to understand user motivation and to elicit user participation in crowdsourcing systems. However, incentive engineering, i.e., designing incentives that can purposefully motivate users, is still an open question and remains one of the key challenges of crowdsourcing initiatives. In this work in progress, we propose a general and systematic incentive engineering framework that system designers can use to implement appropriate incentives in order to effect desirable user behaviours.
△ Less
Submitted 5 September, 2016;
originally announced September 2016.
-
Consistency of Hitomi, XMM-Newton and Chandra 3.5 keV data from Perseus
Authors:
Joseph P. Conlon,
Francesca Day,
Nicholas Jennings,
Sven Krippendorf,
Markus Rummel
Abstract:
\emph{Hitomi} observations of Perseus with the Soft X-ray Spectrometer (SXS) provide a high-resolution look at the 3.5 keV feature reported by multiple groups in the Perseus cluster. The \emph{Hitomi} spectrum -- which involves the sum of diffuse cluster emission and the point-like central Active Galactic Nucleus (AGN) -- does not show any excess at $E \sim 3.5 {\rm keV}$, giving an apparent incon…
▽ More
\emph{Hitomi} observations of Perseus with the Soft X-ray Spectrometer (SXS) provide a high-resolution look at the 3.5 keV feature reported by multiple groups in the Perseus cluster. The \emph{Hitomi} spectrum -- which involves the sum of diffuse cluster emission and the point-like central Active Galactic Nucleus (AGN) -- does not show any excess at $E \sim 3.5 {\rm keV}$, giving an apparent inconsistency with previous observations of excess diffuse emission. We point out that 2009 \emph{Chandra} data reveals a strong dip in the AGN spectrum at $E = (3.54 \pm 0.02) {\rm keV}$ (cluster frame) -- the identical energy to the diffuse excess observed by \emph{XMM-Newton}. Scaling this dip to the 2016 AGN luminosity and adding it to the diffuse \emph{XMM-Newton} excess, this predicts an overall dip in the SXS field of view of $(-5.9 \pm 4.4) \times 10^{-6} \, {\rm ph} \, {\rm cm}^{-2} \, {\rm s}^{-1}$ at $E= 3.54$ keV -- a precise match to the \emph{Hitomi} data when broadened by the dark matter virial velocity. We describe models of Fluorescent Dark Matter that can reproduce this physics, in which dark matter absorbs and then re-emits 3.5 keV photons emitted from the central AGN.
△ Less
Submitted 2 November, 2017; v1 submitted 4 August, 2016;
originally announced August 2016.
-
Acyclic Games and Iterative Voting
Authors:
Reshef Meir,
Maria Polukarov,
Jeffrey S. Rosenschein,
Nicholas R. Jennings
Abstract:
We consider iterative voting models and position them within the general framework of acyclic games and game forms. More specifically, we classify convergence results based on the underlying assumptions on the agent scheduler (the order of players) and the action scheduler (which better-reply is played).
Our main technical result is providing a complete picture of conditions for acyclicity in se…
▽ More
We consider iterative voting models and position them within the general framework of acyclic games and game forms. More specifically, we classify convergence results based on the underlying assumptions on the agent scheduler (the order of players) and the action scheduler (which better-reply is played).
Our main technical result is providing a complete picture of conditions for acyclicity in several variations of Plurality voting. In particular, we show that (a) under the traditional lexicographic tie-breaking, the game converges for any order of players under a weak restriction on voters' actions; and (b) Plurality with randomized tie-breaking is not guaranteed to converge under arbitrary agent schedulers, but from any initial state there is \emph{some} path of better-replies to a Nash equilibrium. We thus show a first separation between restricted-acyclicity and weak-acyclicity of game forms, thereby settling an open question from [Kukushkin, IJGT 2011]. In addition, we refute another conjecture regarding strongly-acyclic voting rules.
△ Less
Submitted 19 June, 2016;
originally announced June 2016.
-
Constraints on Axion-Like Particles from X-ray Observations of NGC1275
Authors:
Marcus Berg,
Joseph P. Conlon,
Francesca Day,
Nicholas Jennings,
Sven Krippendorf,
Andrew J. Powell,
Markus Rummel
Abstract:
Axion-like particles (ALPs) can induce localised oscillatory modulations in the spectra of photon sources passing through astrophysical magnetic fields. Ultra-deep Chandra observations of the Perseus cluster contain over $5 \times 10^5$ counts from the AGN of the central cluster galaxy NGC1275, and represent a dataset of extraordinary quality for ALP searches. We use this dataset to search for X-r…
▽ More
Axion-like particles (ALPs) can induce localised oscillatory modulations in the spectra of photon sources passing through astrophysical magnetic fields. Ultra-deep Chandra observations of the Perseus cluster contain over $5 \times 10^5$ counts from the AGN of the central cluster galaxy NGC1275, and represent a dataset of extraordinary quality for ALP searches. We use this dataset to search for X-ray spectral irregularities from the AGN. The absence of irregularities at the O(30%) level allows us to place leading constraints on the ALP-photon mixing parameter $g_{aγγ} \lesssim 1.4 - 4.0 \times 10^{-12} {\rm GeV}^{-1}$ for $m_a \lesssim 10^{-12}$ eV, depending on assumptions on the magnetic field realisation along the line of sight.
△ Less
Submitted 12 September, 2017; v1 submitted 3 May, 2016;
originally announced May 2016.
-
A new structural stochastic volatility model of asset pricing and its stylized facts
Authors:
Radu T. Pruna,
Maria Polukarov,
Nicholas R. Jennings
Abstract:
Building on a prominent agent-based model, we present a new structural stochastic volatility asset pricing model of fundamentalists vs. chartists where the prices are determined based on excess demand. Specifically, this allows for modelling stochastic interactions between agents, based on a herding process corrected by a price misalignment, and incorporating strong noise components in the agents'…
▽ More
Building on a prominent agent-based model, we present a new structural stochastic volatility asset pricing model of fundamentalists vs. chartists where the prices are determined based on excess demand. Specifically, this allows for modelling stochastic interactions between agents, based on a herding process corrected by a price misalignment, and incorporating strong noise components in the agents' demand. The model's parameters are estimated using the method of simulated moments, where the moments reflect the basic properties of the daily returns of a stock market index. In addition, for the first time we apply a (parametric) bootstrap method in a setting where the switching between strategies is modelled using a discrete choice approach. As we demonstrate, the resulting dynamics replicate a rich set of the stylized facts of the daily financial data including: heavy tails, volatility clustering, long memory in absolute returns, as well as the absence of autocorrelation in raw returns, volatility-volume correlations, aggregate Gaussianity, concave price impact and extreme price events.
△ Less
Submitted 29 April, 2016;
originally announced April 2016.
-
Time-Sensitive Bayesian Information Aggregation for Crowdsourcing Systems
Authors:
Matteo Venanzi,
John Guiver,
Pushmeet Kohli,
Nick Jennings
Abstract:
Crowdsourcing systems commonly face the problem of aggregating multiple judgments provided by potentially unreliable workers. In addition, several aspects of the design of efficient crowdsourcing processes, such as defining worker's bonuses, fair prices and time limits of the tasks, involve knowledge of the likely duration of the task at hand. Bringing this together, in this work we introduce a ne…
▽ More
Crowdsourcing systems commonly face the problem of aggregating multiple judgments provided by potentially unreliable workers. In addition, several aspects of the design of efficient crowdsourcing processes, such as defining worker's bonuses, fair prices and time limits of the tasks, involve knowledge of the likely duration of the task at hand. Bringing this together, in this work we introduce a new time--sensitive Bayesian aggregation method that simultaneously estimates a task's duration and obtains reliable aggregations of crowdsourced judgments. Our method, called BCCTime, builds on the key insight that the time taken by a worker to perform a task is an important indicator of the likely quality of the produced judgment. To capture this, BCCTime uses latent variables to represent the uncertainty about the workers' completion time, the tasks' duration and the workers' accuracy. To relate the quality of a judgment to the time a worker spends on a task, our model assumes that each task is completed within a latent time window within which all workers with a propensity to genuinely attempt the labelling task (i.e., no spammers) are expected to submit their judgments. In contrast, workers with a lower propensity to valid labeling, such as spammers, bots or lazy labelers, are assumed to perform tasks considerably faster or slower than the time required by normal workers. Specifically, we use efficient message-passing Bayesian inference to learn approximate posterior probabilities of (i) the confusion matrix of each worker, (ii) the propensity to valid labeling of each worker, (iii) the unbiased duration of each task and (iv) the true label of each task. Using two real-world public datasets for entity linking tasks, we show that BCCTime produces up to 11% more accurate classifications and up to 100% more informative estimates of a task's duration compared to state-of-the-art methods.
△ Less
Submitted 18 April, 2016; v1 submitted 21 October, 2015;
originally announced October 2015.
-
Cooperative Equilibrium beyond Social Dilemmas: Pareto Solvable Games
Authors:
Valerio Capraro,
Maria Polukarov,
Matteo Venanzi,
Nicholas R. Jennings
Abstract:
A recently introduced concept of "cooperative equilibrium", based on the assumption that players have a natural attitude to cooperation, has been proven a powerful tool in predicting human behaviour in social dilemmas. In this paper, we extend this idea to more general game models, termed "Pareto solvable" games, which in particular include the Nash Bargaining Problem and the Ultimatum Game. We sh…
▽ More
A recently introduced concept of "cooperative equilibrium", based on the assumption that players have a natural attitude to cooperation, has been proven a powerful tool in predicting human behaviour in social dilemmas. In this paper, we extend this idea to more general game models, termed "Pareto solvable" games, which in particular include the Nash Bargaining Problem and the Ultimatum Game. We show that games in this class possess a unique pure cooperative equilibrium. Furthermore, for the Ultimatum Game, this notion appears to be strongly correlated with a suitably defined variant of the Dictator Game. We support this observation with the results of a behavioural experiment conducted using Amazon Mechanical Turk, which demonstrates that our approach allows for making statistically precise predictions of average behaviour in such settings.
△ Less
Submitted 25 September, 2015;
originally announced September 2015.
-
Efficient Task Collaboration with Execution Uncertainty
Authors:
Dengji Zhao,
Sarvapali D. Ramchurn,
Nicholas R. Jennings
Abstract:
We study a general task allocation problem, involving multiple agents that collaboratively accomplish tasks and where agents may fail to successfully complete the tasks assigned to them (known as execution uncertainty). The goal is to choose an allocation that maximises social welfare while taking their execution uncertainty into account. We show that this can be achieved by using the post-executi…
▽ More
We study a general task allocation problem, involving multiple agents that collaboratively accomplish tasks and where agents may fail to successfully complete the tasks assigned to them (known as execution uncertainty). The goal is to choose an allocation that maximises social welfare while taking their execution uncertainty into account. We show that this can be achieved by using the post-execution verification (PEV)-based mechanism if and only if agents' valuations satisfy a multilinearity condition. We then consider a more complex setting where an agent's execution uncertainty is not completely predictable by the agent alone but aggregated from all agents' private opinions (known as trust). We show that PEV-based mechanism with trust is still truthfully implementable if and only if the trust aggregation is multilinear.
△ Less
Submitted 17 September, 2015;
originally announced September 2015.
-
Incentive Design for Ridesharing with Uncertainty
Authors:
Dengji Zhao,
Sarvapali D. Ramchurn,
Nicholas R. Jennings
Abstract:
We consider a ridesharing problem where there is uncertainty about the completion of trips from both drivers and riders. Specifically, we study ridesharing mechanisms that aim to incentivize commuters to reveal their valuation for trips and their probability of undertaking their trips. Due to the interdependence created by the uncertainty on commuters' valuations, we show that the Groves mechanism…
▽ More
We consider a ridesharing problem where there is uncertainty about the completion of trips from both drivers and riders. Specifically, we study ridesharing mechanisms that aim to incentivize commuters to reveal their valuation for trips and their probability of undertaking their trips. Due to the interdependence created by the uncertainty on commuters' valuations, we show that the Groves mechanisms are not ex-post truthful even if there is only one commuter whose valuation depends on the other commuters' uncertainty of undertaking their trips. To circumvent this impossibility, we propose an ex-post truthful mechanism, the best incentive we can design without sacrificing social welfare in this setting. Our mechanism pays a commuter if she undertakes her trip, otherwise she is penalized for not undertaking her trip. Furthermore, we identify a sufficient and necessary condition under which our mechanism is ex-post truthful.
△ Less
Submitted 7 May, 2015;
originally announced May 2015.
-
Towards a Fair Allocation of Rewards in Multi-Level Marketing
Authors:
Talal Rahwan,
Victor Naroditskiy,
Tomasz Michalak,
Michael Wooldridge,
Nicholas R Jennings
Abstract:
An increasing number of businesses and organisations rely on existing users for finding new users or spreading a message. One of the widely used "refer-a-friend" mechanisms offers an equal reward to both the referrer and the invitee. This mechanism provides incentives for direct referrals and is fair to the invitee. On the other hand, multi-level marketing and recent social mobilisation experiment…
▽ More
An increasing number of businesses and organisations rely on existing users for finding new users or spreading a message. One of the widely used "refer-a-friend" mechanisms offers an equal reward to both the referrer and the invitee. This mechanism provides incentives for direct referrals and is fair to the invitee. On the other hand, multi-level marketing and recent social mobilisation experiments focus on mechanisms that incentivise both direct and indirect referrals. Such mechanisms share the reward for inviting a new member among the ancestors, usually in geometrically decreasing shares. A new member receives nothing at the time of joining. We study fairness in multi-level marketing mechanisms. We show how characteristic function games can be used to model referral marketing, show how the canonical fairness concept of the Shapley value can be applied to this setting, and establish the complexity of finding the Shapley value in each class, and provide a comparison of the Shapley value-based mechanism to existing referral mechanisms.
△ Less
Submitted 2 April, 2014;
originally announced April 2014.
-
Efficient Computation of the Shapley Value for Game-Theoretic Network Centrality
Authors:
Tomasz Pawel Michalak,
Karthik V Aadithya,
Piotr L. Szczepanski,
Balaraman Ravindran,
Nicholas R. Jennings
Abstract:
The Shapley value---probably the most important normative payoff division scheme in coalitional games---has recently been advocated as a useful measure of centrality in networks. However, although this approach has a variety of real-world applications (including social and organisational networks, biological networks and communication networks), its computational properties have not been widely st…
▽ More
The Shapley value---probably the most important normative payoff division scheme in coalitional games---has recently been advocated as a useful measure of centrality in networks. However, although this approach has a variety of real-world applications (including social and organisational networks, biological networks and communication networks), its computational properties have not been widely studied. To date, the only practicable approach to compute Shapley value-based centrality has been via Monte Carlo simulations which are computationally expensive and not guaranteed to give an exact answer. Against this background, this paper presents the first study of the computational aspects of the Shapley value for network centralities. Specifically, we develop exact analytical formulae for Shapley value-based centrality in both weighted and unweighted networks and develop efficient (polynomial time) and exact algorithms based on them. We empirically evaluate these algorithms on two real-life examples (an infrastructure network representing the topology of the Western States Power Grid and a collaboration network from the field of astrophysics) and demonstrate that they deliver significant speedups over the Monte Carlo approach. For instance, in the case of unweighted networks our algorithms are able to return the exact solution about 1600 times faster than the Monte Carlo approximation, even if we allow for a generous 10% error margin for the latter method.
△ Less
Submitted 3 February, 2014;
originally announced February 2014.
-
Coalition Structure Generation over Graphs
Authors:
Thomas Voice,
Maria Polukarov,
Nicholas R. Jennings
Abstract:
We give the analysis of the computational complexity of coalition structure generation over graphs. Given an undirected graph G = (N,E) and a valuation function v : P(N) \to R over the subsets of nodes, the problem is to find a partition of N into connected subsets, that maximises the sum of the components values. This problem is generally NP-complete; in particular, it is hard for a defined class…
▽ More
We give the analysis of the computational complexity of coalition structure generation over graphs. Given an undirected graph G = (N,E) and a valuation function v : P(N) \to R over the subsets of nodes, the problem is to find a partition of N into connected subsets, that maximises the sum of the components values. This problem is generally NP-complete; in particular, it is hard for a defined class of valuation functions which are independent of disconnected members - that is, two nodes have no effect on each other's marginal contribution to their vertex separator. Nonetheless, for all such functions we provide bounds on the complexity of coalition structure generation over general and minor-free graphs. Our proof is constructive and yields algorithms for solving corresponding instances of the problem. Furthermore, we derive linear time bounds for graphs of bounded treewidth. However, as we show, the problem remains NP-complete for planar graphs, and hence, for any K_k minor free graphs where k \geq 5. Moreover, a 3-SAT problem with m clauses can be represented by a coalition structure generation problem over a planar graph with O(m^2) nodes. Importantly, our hardness result holds for a particular subclass of valuation functions, termed edge sum, where the value of each subset of nodes is simply determined by the sum of given weights of the edges in the induced subgraph.
△ Less
Submitted 23 January, 2014;
originally announced January 2014.
-
Cooperative Games with Overlap** Coalitions
Authors:
Georgios Chalkiadakis,
Edith Elkind,
Evangelos Markakis,
Maria Polukarov,
Nicholas Robert Jennings
Abstract:
In the usual models of cooperative game theory, the outcome of a coalition formation process is either the grand coalition or a coalition structure that consists of disjoint coalitions. However, in many domains where coalitions are associated with tasks, an agent may be involved in executing more than one task, and thus may distribute his resources among several coalitions. To tackle such scenario…
▽ More
In the usual models of cooperative game theory, the outcome of a coalition formation process is either the grand coalition or a coalition structure that consists of disjoint coalitions. However, in many domains where coalitions are associated with tasks, an agent may be involved in executing more than one task, and thus may distribute his resources among several coalitions. To tackle such scenarios, we introduce a model for cooperative games with overlap** coalitions--or overlap** coalition formation (OCF) games. We then explore the issue of stability in this setting. In particular, we introduce a notion of the core, which generalizes the corresponding notion in the traditional (non-overlap**) scenario. Then, under some quite general conditions, we characterize the elements of the core, and show that any element of the core maximizes the social welfare. We also introduce a concept of balancedness for overlap** coalitional games, and use it to characterize coalition structures that can be extended to elements of the core. Finally, we generalize the notion of convexity to our setting, and show that under some natural assumptions convex games have a non-empty core. Moreover, we introduce two alternative notions of stability in OCF that allow a wider range of deviations, and explore the relationships among the corresponding definitions of the core, as well as the classic (non-overlap**) core and the Aubin core. We illustrate the general properties of the three cores, and also study them from a computational perspective, thus obtaining additional insights into their fundamental structure.
△ Less
Submitted 16 January, 2014;
originally announced January 2014.
-
Trust-Based Mechanisms for Robust and Efficient Task Allocation in the Presence of Execution Uncertainty
Authors:
Sarvapali Dyanand Ramchurn,
Claudio Mezzetti,
Andrea Giovannucci,
Juan Antonio Rodriguez-Aguilar,
Rajdeep Kumar Dash,
Nicholas Robert Jennings
Abstract:
Vickrey-Clarke-Groves (VCG) mechanisms are often used to allocate tasks to selfish and rational agents. VCG mechanisms are incentive compatible, direct mechanisms that are efficient (i.e., maximise social utility) and individually rational (i.e., agents prefer to join rather than opt out). However, an important assumption of these mechanisms is that the agents will "always" successfully complete…
▽ More
Vickrey-Clarke-Groves (VCG) mechanisms are often used to allocate tasks to selfish and rational agents. VCG mechanisms are incentive compatible, direct mechanisms that are efficient (i.e., maximise social utility) and individually rational (i.e., agents prefer to join rather than opt out). However, an important assumption of these mechanisms is that the agents will "always" successfully complete their allocated tasks. Clearly, this assumption is unrealistic in many real-world applications, where agents can, and often do, fail in their endeavours. Moreover, whether an agent is deemed to have failed may be perceived differently by different agents. Such subjective perceptions about an agents probability of succeeding at a given task are often captured and reasoned about using the notion of "trust". Given this background, in this paper we investigate the design of novel mechanisms that take into account the trust between agents when allocating tasks.
Specifically, we develop a new class of mechanisms, called "trust-based mechanisms", that can take into account multiple subjective measures of the probability of an agent succeeding at a given task and produce allocations that maximise social utility, whilst ensuring that no agent obtains a negative utility. We then show that such mechanisms pose a challenging new combinatorial optimisation problem (that is NP-complete), devise a novel representation for solving the problem, and develop an effective integer programming solution (that can solve instances with about 2x10^5 possible allocations in 40 seconds).
△ Less
Submitted 15 January, 2014;
originally announced January 2014.
-
An Anytime Algorithm for Optimal Coalition Structure Generation
Authors:
Talal Rahwan,
Sarvapali Dyanand Ramchurn,
Nicholas Robert Jennings,
Andrea Giovannucci
Abstract:
Coalition formation is a fundamental type of interaction that involves the creation of coherent grou**s of distinct, autonomous, agents in order to efficiently achieve their individual or collective goals. Forming effective coalitions is a major research challenge in the field of multi-agent systems. Central to this endeavour is the problem of determining which of the many possible coalitions t…
▽ More
Coalition formation is a fundamental type of interaction that involves the creation of coherent grou**s of distinct, autonomous, agents in order to efficiently achieve their individual or collective goals. Forming effective coalitions is a major research challenge in the field of multi-agent systems. Central to this endeavour is the problem of determining which of the many possible coalitions to form in order to achieve some goal. This usually requires calculating a value for every possible coalition, known as the coalition value, which indicates how beneficial that coalition would be if it was formed. Once these values are calculated, the agents usually need to find a combination of coalitions, in which every agent belongs to exactly one coalition, and by which the overall outcome of the system is maximized. However, this coalition structure generation problem is extremely challenging due to the number of possible solutions that need to be examined, which grows exponentially with the number of agents involved. To date, therefore, many algorithms have been proposed to solve this problem using different techniques ranging from dynamic programming, to integer programming, to stochastic search all of which suffer from major limitations relating to execution time, solution quality, and memory requirements.
With this in mind, we develop an anytime algorithm to solve the coalition structure generation problem. Specifically, the algorithm uses a novel representation of the search space, which partitions the space of possible solutions into sub-spaces such that it is possible to compute upper and lower bounds on the values of the best coalition structures in them. These bounds are then used to identify the sub-spaces that have no potential of containing the optimal solution so that they can be pruned. The algorithm, then, searches through the remaining sub-spaces very efficiently using a branch-and-bound technique to avoid examining all the solutions within the searched subspace(s). In this setting, we prove that our algorithm enumerates all coalition structures efficiently by avoiding redundant and invalid solutions automatically. Moreover, in order to effectively test our algorithm we develop a new type of input distribution which allows us to generate more reliable benchmarks compared to the input distributions previously used in the field. Given this new distribution, we show that for 27 agents our algorithm is able to find solutions that are optimal in 0.175% of the time required by the fastest available algorithm in the literature. The algorithm is anytime, and if interrupted before it would have normally terminated, it can still provide a solution that is guaranteed to be within a bound from the optimal one. Moreover, the guarantees we provide on the quality of the solution are significantly better than those provided by the previous state of the art algorithms designed for this purpose. For example, for the worst case distribution given 25 agents, our algorithm is able to find a 90% efficient solution in around 10% of time it takes to find the optimal solution.
△ Less
Submitted 15 January, 2014;
originally announced January 2014.
-
Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes
Authors:
Enrico H. Gerding,
Rajdeep Kumar Dash,
Andrew Byde,
Nicholas Robert Jennings
Abstract:
We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this b…
▽ More
We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market.
△ Less
Submitted 14 January, 2014;
originally announced January 2014.
-
A Hierarchical Dynamic Programming Algorithm for Optimal Coalition Structure Generation
Authors:
Meritxell Vinyals,
Thomas Voice,
Sarvapali Ramchurn,
Nicholas R. Jennings
Abstract:
We present a new Dynamic Programming (DP) formulation of the Coalition Structure Generation (CSG) problem based on imposing a hierarchical organizational structure over the agents. We show the efficiency of this formulation by deriving DyPE, a new optimal DP algorithm which significantly outperforms current DP approaches in speed and memory usage. In the classic case, in which all coalitions are f…
▽ More
We present a new Dynamic Programming (DP) formulation of the Coalition Structure Generation (CSG) problem based on imposing a hierarchical organizational structure over the agents. We show the efficiency of this formulation by deriving DyPE, a new optimal DP algorithm which significantly outperforms current DP approaches in speed and memory usage. In the classic case, in which all coalitions are feasible, DyPE has half the memory requirements of other DP approaches. On graph-restricted CSG, in which feasibility is restricted by a (synergy) graph, DyPE has either the same or lower computational complexity depending on the underlying graph structure of the problem. Our empirical evaluation shows that DyPE outperforms the state-of-the-art DP approaches by several orders of magnitude in a large range of graph structures (e.g. for certain scalefree graphs DyPE reduces the memory requirements by $10^6$ and solves problems that previously needed hours in minutes).
△ Less
Submitted 24 October, 2013;
originally announced October 2013.