-
Certificates and Witnesses for Multi-Objective Queries in Markov Decision Processes
Authors:
Christel Baier,
Calvin Chau,
Sascha Klüppelholz
Abstract:
Certifying verification algorithms not only return whether a given property holds or not, but also provide an accompanying independently checkable certificate and a corresponding witness. The certificate can be used to easily validate the correctness of the result and the witness provides useful diagnostic information, e.g. for debugging purposes. Thus, certificates and witnesses substantially inc…
▽ More
Certifying verification algorithms not only return whether a given property holds or not, but also provide an accompanying independently checkable certificate and a corresponding witness. The certificate can be used to easily validate the correctness of the result and the witness provides useful diagnostic information, e.g. for debugging purposes. Thus, certificates and witnesses substantially increase the trustworthiness and understandability of the verification process. In this work, we consider certificates and witnesses for multi-objective reachability-invariant and mean-payoff queries in Markov decision processes, that is conjunctions or disjunctions either of reachability and invariant or mean-payoff predicates, both universally and existentially quantified. Thereby, we generalize previous works on certificates and witnesses for single reachability and invariant constraints. To this end, we turn known linear programming techniques into certifying algorithms and show that witnesses in the form of schedulers and subsystems can be obtained. As a proof-of-concept, we report on implementations of certifying verification algorithms and experimental results.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Researchy Questions: A Dataset of Multi-Perspective, Decompositional Questions for LLM Web Agents
Authors:
Corby Rosset,
Ho-Lam Chung,
Guanghui Qin,
Ethan C. Chau,
Zhuo Feng,
Ahmed Awadallah,
Jennifer Neville,
Nikhil Rao
Abstract:
Existing question answering (QA) datasets are no longer challenging to most powerful Large Language Models (LLMs). Traditional QA benchmarks like TriviaQA, NaturalQuestions, ELI5 and HotpotQA mainly study ``known unknowns'' with clear indications of both what information is missing, and how to find it to answer the question. Hence, good performance on these benchmarks provides a false sense of sec…
▽ More
Existing question answering (QA) datasets are no longer challenging to most powerful Large Language Models (LLMs). Traditional QA benchmarks like TriviaQA, NaturalQuestions, ELI5 and HotpotQA mainly study ``known unknowns'' with clear indications of both what information is missing, and how to find it to answer the question. Hence, good performance on these benchmarks provides a false sense of security. A yet unmet need of the NLP community is a bank of non-factoid, multi-perspective questions involving a great deal of unclear information needs, i.e. ``unknown uknowns''. We claim we can find such questions in search engine logs, which is surprising because most question-intent queries are indeed factoid. We present Researchy Questions, a dataset of search engine queries tediously filtered to be non-factoid, ``decompositional'' and multi-perspective. We show that users spend a lot of ``effort'' on these questions in terms of signals like clicks and session length, and that they are also challenging for GPT-4. We also show that ``slow thinking'' answering techniques, like decomposition into sub-questions shows benefit over answering directly. We release $\sim$ 100k Researchy Questions, along with the Clueweb22 URLs that were clicked.
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
Dodo: Dynamic Contextual Compression for Decoder-only LMs
Authors:
Guanghui Qin,
Corby Rosset,
Ethan C. Chau,
Nikhil Rao,
Benjamin Van Durme
Abstract:
Transformer-based language models (LMs) are inefficient in long contexts. We propose Dodo, a solution for context compression. Instead of one vector per token in a standard transformer model, Dodo represents text with a dynamic number of hidden states at each layer, reducing the cost of self-attention to a fraction of typical time and space. Moreover, off-the-shelf models such as LLaMA can be adap…
▽ More
Transformer-based language models (LMs) are inefficient in long contexts. We propose Dodo, a solution for context compression. Instead of one vector per token in a standard transformer model, Dodo represents text with a dynamic number of hidden states at each layer, reducing the cost of self-attention to a fraction of typical time and space. Moreover, off-the-shelf models such as LLaMA can be adapted to Dodo by efficient parameter tuning methods such as LoRA. In use, Dodo can act as either an autoregressive LM or a context compressor for downstream tasks. We demonstrate through experiments in language modeling, question answering, and summarization that Dodo retains capabilities in these tasks, while drastically reducing the overhead during decoding. For example, in the autoencoding task, Dodo shrinks context at a 20x compression ratio with a BLEU score of 98% for reconstruction, achieving nearly lossless encoding.
△ Less
Submitted 13 June, 2024; v1 submitted 3 October, 2023;
originally announced October 2023.
-
Automatic Pair Construction for Contrastive Post-training
Authors:
Canwen Xu,
Corby Rosset,
Ethan C. Chau,
Luciano Del Corro,
Shweti Mahajan,
Julian McAuley,
Jennifer Neville,
Ahmed Hassan Awadallah,
Nikhil Rao
Abstract:
Alignment serves as an important step to steer large language models (LLMs) towards human preferences. In this paper, we propose an automatic way to construct contrastive data for LLM, using preference pairs from multiple models of varying strengths (e.g., InstructGPT, ChatGPT and GPT-4). We compare the contrastive techniques of SLiC and DPO to SFT baselines and find that DPO provides a step-funct…
▽ More
Alignment serves as an important step to steer large language models (LLMs) towards human preferences. In this paper, we propose an automatic way to construct contrastive data for LLM, using preference pairs from multiple models of varying strengths (e.g., InstructGPT, ChatGPT and GPT-4). We compare the contrastive techniques of SLiC and DPO to SFT baselines and find that DPO provides a step-function improvement even after continuing SFT saturates. We also explore a data curriculum learning scheme for contrastive post-training, which starts by learning from "easier" pairs and transitioning to "harder" ones, which further improves alignment. Finally, we scale up our experiments to train with more data and larger models like Orca. Remarkably, our automatic contrastive post-training further improves the performance of Orca, already a state-of-the-art instruction learning model tuned with GPT-4 outputs, to outperform ChatGPT.
△ Less
Submitted 2 April, 2024; v1 submitted 3 October, 2023;
originally announced October 2023.
-
Syntactic vs Semantic Linear Abstraction and Refinement of Neural Networks
Authors:
Calvin Chau,
Jan Křetínský,
Stefanie Mohr
Abstract:
Abstraction is a key verification technique to improve scalability. However, its use for neural networks is so far extremely limited. Previous approaches for abstracting classification networks replace several neurons with one of them that is similar enough. We can classify the similarity as defined either syntactically (using quantities on the connections between neurons) or semantically (on the…
▽ More
Abstraction is a key verification technique to improve scalability. However, its use for neural networks is so far extremely limited. Previous approaches for abstracting classification networks replace several neurons with one of them that is similar enough. We can classify the similarity as defined either syntactically (using quantities on the connections between neurons) or semantically (on the activation values of neurons for various inputs). Unfortunately, the previous approaches only achieve moderate reductions, when implemented at all. In this work, we provide a more flexible framework where a neuron can be replaced with a linear combination of other neurons, improving the reduction. We apply this approach both on syntactic and semantic abstractions, and implement and evaluate them experimentally. Further, we introduce a refinement method for our abstractions, allowing for finding a better balance between reduction and precision.
△ Less
Submitted 20 July, 2023;
originally announced July 2023.
-
DClEVerNet: Deep Combinatorial Learning for Efficient EV Charging Scheduling in Large-scale Networked Facilities
Authors:
Bushra Alshehhi,
Areg Karapetyan,
Khaled Elbassioni,
Sid Chi-Kin Chau,
Majid Khonji
Abstract:
With the electrification of transportation, the rising uptake of electric vehicles (EVs) might stress distribution networks significantly, leaving their performance degraded and stability jeopardized. To accommodate these new loads cost-effectively, modern power grids require coordinated or ``smart'' charging strategies capable of optimizing EV charging scheduling in a scalable and efficient fashi…
▽ More
With the electrification of transportation, the rising uptake of electric vehicles (EVs) might stress distribution networks significantly, leaving their performance degraded and stability jeopardized. To accommodate these new loads cost-effectively, modern power grids require coordinated or ``smart'' charging strategies capable of optimizing EV charging scheduling in a scalable and efficient fashion. With this in view, the present work focuses on reservation management programs for large-scale, networked EV charging stations. We formulate a time-coupled binary optimization problem that maximizes EV users' total welfare gain while accounting for the network's available power capacity and stations' occupancy limits. To tackle the problem at scale while retaining high solution quality, a data-driven optimization framework combining techniques from the fields of Deep Learning and Approximation Algorithms is introduced. The framework's key ingredient is a novel input-output processing scheme for neural networks that allows direct extrapolation to problem sizes substantially larger than those included in the training set. Extensive numerical simulations based on synthetic and real-world data traces verify the effectiveness and superiority of the presented approach over two representative scheduling algorithms. Lastly, we round up the contributions by listing several immediate extensions to the proposed framework and outlining the prospects for further exploration.
△ Less
Submitted 22 August, 2023; v1 submitted 18 May, 2023;
originally announced May 2023.
-
Blockchain-enabled Parametric Solar Energy Insurance via Remote Sensing
Authors:
Mingyu Hao,
Keyang Qian,
Sid Chi-Kin Chau
Abstract:
Despite its popularity, the nature of solar energy is highly uncertain and weather dependent, affecting the business viability and investment of solar energy generation, especially for household users. To stabilize the income from solar energy generation, there have been limited traditional options, such as using energy storage to pool excessive solar energy in off-peak periods or financial deriva…
▽ More
Despite its popularity, the nature of solar energy is highly uncertain and weather dependent, affecting the business viability and investment of solar energy generation, especially for household users. To stabilize the income from solar energy generation, there have been limited traditional options, such as using energy storage to pool excessive solar energy in off-peak periods or financial derivatives from future markets to hedge energy prices. In this paper, we explore a novel idea of "parametric solar energy insurance", by which solar panel owners can insure their solar energy generation based on a verifiable geographically specific index (surface solar irradiation). Parametric solar energy insurance offers opportunities of financial subsidies for insufficient solar energy generation and amortizes the fluctuations of renewable energy generation geographically. Furthermore, we propose to leverage blockchain and remote sensing (satellite imagery) to provide a publicly verifiable platform for solar energy insurance, which not only automates the underwriting and claims of a solar energy insurance policy, but also improves its accountability and transparency. We utilize the state-of-the-art succinct zero-knowledge proofs (zk-SNARK) to realize privacy-preserving blockchain-based solar energy insurance on real-world permissionless blockchain platform Ethereum.
△ Less
Submitted 17 May, 2023; v1 submitted 17 May, 2023;
originally announced May 2023.
-
Privacy-preserving Blockchain-enabled Parametric Insurance via Remote Sensing and IoT
Authors:
Mingyu Hao,
Keyang Qian,
Sid Chi-Kin Chau
Abstract:
Traditional Insurance, a popular approach of financial risk management, has suffered from the issues of high operational costs, opaqueness, inefficiency and a lack of trust. Recently, blockchain-enabled "parametric insurance" through authorized data sources (e.g., remote sensing and IoT) aims to overcome these issues by automating the underwriting and claim processes of insurance policies on a blo…
▽ More
Traditional Insurance, a popular approach of financial risk management, has suffered from the issues of high operational costs, opaqueness, inefficiency and a lack of trust. Recently, blockchain-enabled "parametric insurance" through authorized data sources (e.g., remote sensing and IoT) aims to overcome these issues by automating the underwriting and claim processes of insurance policies on a blockchain. However, the openness of blockchain platforms raises a concern of user privacy, as the private user data in insurance claims on a blockchain may be exposed to outsiders. In this paper, we propose a privacy-preserving parametric insurance framework based on succinct zero-knowledge proofs (zk-SNARKs), whereby an insuree submits a zero-knowledge proof (without revealing any private data) for the validity of an insurance claim and the authenticity of its data sources to a blockchain for transparent verification. Moreover, we extend the recent zk-SNARKs to support robust privacy protection for multiple heterogeneous data sources and improve its efficiency to cut the incurred gas cost by 80%. As a proof-of-concept, we implemented a working prototype of bushfire parametric insurance on real-world blockchain platform Ethereum, and present extensive empirical evaluations.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
Practically Efficient Secure Computation of Rank-based Statistics Over Distributed Datasets
Authors:
Nan Wang,
Sid Chi-Kin Chau
Abstract:
In this paper, we propose a practically efficient model for securely computing rank-based statistics, e.g., median, percentiles and quartiles, over distributed datasets in the malicious setting without leaking individual data privacy. Based on the binary search technique of Aggarwal et al. (EUROCRYPT \textquotesingle 04), we respectively present an interactive protocol and a non-interactive protoc…
▽ More
In this paper, we propose a practically efficient model for securely computing rank-based statistics, e.g., median, percentiles and quartiles, over distributed datasets in the malicious setting without leaking individual data privacy. Based on the binary search technique of Aggarwal et al. (EUROCRYPT \textquotesingle 04), we respectively present an interactive protocol and a non-interactive protocol, involving at most $\log ||R||$ rounds, where $||R||$ is the range size of the dataset elements. Besides, we introduce a series of optimisation techniques to reduce the round complexity. Our computing model is modular and can be instantiated with either homomorphic encryption or secret-sharing schemes. Compared to the state-of-the-art solutions, it provides stronger security and privacy while maintaining high efficiency and accuracy. Unlike differential-privacy-based solutions, it does not suffer a trade-off between accuracy and privacy. On the other hand, it only involves $O(N \log ||R||)$ time complexity, which is far more efficient than those bitwise-comparison-based solutions with $O(N^2\log ||R||)$ time complexity, where $N$ is the dataset size. Finally, we provide a UC-secure instantiation with the threshold Paillier cryptosystem and $Σ$-protocol zero-knowledge proofs of knowledge.
△ Less
Submitted 16 February, 2023;
originally announced February 2023.
-
BLOX: Macro Neural Architecture Search Benchmark and Algorithms
Authors:
Thomas Chun Pong Chau,
Łukasz Dudziak,
Hongkai Wen,
Nicholas Donald Lane,
Mohamed S Abdelfattah
Abstract:
Neural architecture search (NAS) has been successfully used to design numerous high-performance neural networks. However, NAS is typically compute-intensive, so most existing approaches restrict the search to decide the operations and topological structure of a single block only, then the same block is stacked repeatedly to form an end-to-end model. Although such an approach reduces the size of se…
▽ More
Neural architecture search (NAS) has been successfully used to design numerous high-performance neural networks. However, NAS is typically compute-intensive, so most existing approaches restrict the search to decide the operations and topological structure of a single block only, then the same block is stacked repeatedly to form an end-to-end model. Although such an approach reduces the size of search space, recent studies show that a macro search space, which allows blocks in a model to be different, can lead to better performance. To provide a systematic study of the performance of NAS algorithms on a macro search space, we release Blox - a benchmark that consists of 91k unique models trained on the CIFAR-100 dataset. The dataset also includes runtime measurements of all the models on a diverse set of hardware platforms. We perform extensive experiments to compare existing algorithms that are well studied on cell-based search spaces, with the emerging blockwise approaches that aim to make NAS scalable to much larger macro search spaces. The benchmark and code are available at https://github.com/SamsungLabs/blox.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
Integrating IoT-Sensing and Crowdsensing with Privacy: Privacy-Preserving Hybrid Sensing for Smart Cities
Authors:
Hanwei Zhu,
Sid Chi-Kin Chau,
Gladhi Guarddin,
Weifa Liang
Abstract:
Data sensing and gathering is an essential task for various information-driven services in smart cities. On the one hand, Internet of Things (IoT) sensors can be deployed at certain fixed locations to capture data reliably but suffer from limited sensing coverage. On the other hand, data can also be gathered dynamically through crowdsensing contributed by voluntary users but suffer from its unreli…
▽ More
Data sensing and gathering is an essential task for various information-driven services in smart cities. On the one hand, Internet of Things (IoT) sensors can be deployed at certain fixed locations to capture data reliably but suffer from limited sensing coverage. On the other hand, data can also be gathered dynamically through crowdsensing contributed by voluntary users but suffer from its unreliability and the lack of incentives for users' contributions. In this paper, we explore an integrated paradigm called "hybrid sensing" that harnesses both IoT-sensing and crowdsensing in a complementary manner. In hybrid sensing, users are incentivized to provide sensing data not covered by IoT sensors and provide crowdsourced feedback to assist in calibrating IoT-sensing. Their contributions will be rewarded with credits that can be redeemed to retrieve synthesized information from the hybrid system. In this paper, we develop a hybrid sensing system that supports explicit user privacy -- IoT sensors are obscured physically to prevent capturing private user data, and users interact with a crowdsensing server via a privacy-preserving protocol to preserve their anonymity. A key application of our system is smart parking, by which users can inquire and find the available parking spaces in outdoor parking lots. We implemented our hybrid sensing system for smart parking and conducted extensive empirical evaluations. Finally, our hybrid sensing system can be potentially applied to other information-driven services in smart cities.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
Proceedings Seventeenth International Workshop on the ACL2 Theorem Prover and its Applications
Authors:
Rob Sumners,
Cuong Chau
Abstract:
This volume contains a selection of papers presented at the 17th International Workshop on the ACL2 Theorem Prover and its Applications (ACL2 2022). The workshops are the premier technical forum for presenting research and experiences related to ACL2.
This volume contains a selection of papers presented at the 17th International Workshop on the ACL2 Theorem Prover and its Applications (ACL2 2022). The workshops are the premier technical forum for presenting research and experiences related to ACL2.
△ Less
Submitted 23 May, 2022;
originally announced May 2022.
-
Privacy-Preserving Energy Storage Sharing with Blockchain and Secure Multi-Party Computation
Authors:
Nan Wang,
Sid Chi-Kin Chau,
Yue Zhou
Abstract:
Energy storage provides an effective way of shifting temporal energy demands and supplies, which enables significant cost reduction under time-of-use energy pricing plans. Despite its promising benefits, the cost of present energy storage remains expensive, presenting a major obstacle to practical deployment. A more viable solution to improve the cost-effectiveness is by sharing energy storage, su…
▽ More
Energy storage provides an effective way of shifting temporal energy demands and supplies, which enables significant cost reduction under time-of-use energy pricing plans. Despite its promising benefits, the cost of present energy storage remains expensive, presenting a major obstacle to practical deployment. A more viable solution to improve the cost-effectiveness is by sharing energy storage, such as community sharing, cloud energy storage and peer-to-peer sharing. However, revealing private energy demand data to an external energy storage operator may compromise user privacy, and is susceptible to data misuses and breaches. In this paper, we explore a novel approach to support energy storage sharing with privacy protection, based on privacy-preserving blockchain and secure multi-party computation. We present an integrated solution to enable privacy-preserving energy storage sharing, such that energy storage service scheduling and cost-sharing can be attained without the knowledge of individual users' demands. It also supports auditing and verification by the grid operator via blockchain. Furthermore, our privacy-preserving solution can safeguard against a dishonest majority of users, who may collude in cheating, without requiring a trusted third-party. We implemented our solution as a smart contract on real-world Ethereum blockchain platform, and provide empirical evaluation in this paper.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
Specializing Multilingual Language Models: An Empirical Study
Authors:
Ethan C. Chau,
Noah A. Smith
Abstract:
Pretrained multilingual language models have become a common tool in transferring NLP capabilities to low-resource languages, often with adaptations. In this work, we study the performance, extensibility, and interaction of two such adaptations: vocabulary augmentation and script transliteration. Our evaluations on part-of-speech tagging, universal dependency parsing, and named entity recognition…
▽ More
Pretrained multilingual language models have become a common tool in transferring NLP capabilities to low-resource languages, often with adaptations. In this work, we study the performance, extensibility, and interaction of two such adaptations: vocabulary augmentation and script transliteration. Our evaluations on part-of-speech tagging, universal dependency parsing, and named entity recognition in nine diverse low-resource languages uphold the viability of these approaches while raising new questions around how to optimally adapt multilingual models to low-resource settings.
△ Less
Submitted 17 June, 2022; v1 submitted 16 June, 2021;
originally announced June 2021.
-
Parsing with Multilingual BERT, a Small Corpus, and a Small Treebank
Authors:
Ethan C. Chau,
Lucy H. Lin,
Noah A. Smith
Abstract:
Pretrained multilingual contextual representations have shown great success, but due to the limits of their pretraining data, their benefits do not apply equally to all language varieties. This presents a challenge for language varieties unfamiliar to these models, whose labeled \emph{and unlabeled} data is too limited to train a monolingual model effectively. We propose the use of additional lang…
▽ More
Pretrained multilingual contextual representations have shown great success, but due to the limits of their pretraining data, their benefits do not apply equally to all language varieties. This presents a challenge for language varieties unfamiliar to these models, whose labeled \emph{and unlabeled} data is too limited to train a monolingual model effectively. We propose the use of additional language-specific pretraining and vocabulary augmentation to adapt multilingual models to low-resource settings. Using dependency parsing of four diverse low-resource language varieties as a case study, we show that these methods significantly improve performance over baselines, especially in the lowest-resource cases, and demonstrate the importance of the relationship between such models' pretraining data and target language varieties.
△ Less
Submitted 17 June, 2022; v1 submitted 29 September, 2020;
originally announced September 2020.
-
Approximately Socially-Optimal Decentralized Coalition Formation with Application to P2P Energy Sharing
Authors:
Sid Chi-Kin Chau,
Khaled Elbassioni,
Yue Zhou
Abstract:
The paradigm of P2P (peer-to-peer) economy has emerged in diverse areas. "P2P energy sharing" is a new form of P2P economy in the energy sector, which allows users to establish longer-term sharing arrangements of their local energy resources (e.g., rooftop PVs, home batteries) with joint optimized energy management. In such a P2P setting, a coalition of users is formed for sharing resources in a d…
▽ More
The paradigm of P2P (peer-to-peer) economy has emerged in diverse areas. "P2P energy sharing" is a new form of P2P economy in the energy sector, which allows users to establish longer-term sharing arrangements of their local energy resources (e.g., rooftop PVs, home batteries) with joint optimized energy management. In such a P2P setting, a coalition of users is formed for sharing resources in a decentralized manner by self-interested users based on their individual preferences. A likely outcome of decentralized coalition formation will be a stable coalition structure, where no group of users could cooperatively opt out to form another coalition that induces higher preferences to all its members. Remarkably, there exist a number of fair cost-sharing mechanisms (e.g., equal-split, proportional-split, egalitarian and Nash bargaining solutions of bargaining games) that model practical cost-sharing applications with desirable properties, such as the existence of a stable coalition structure with a small strong price-of-anarchy (SPoA) to approximate the social optimum. In this paper, we provide general results of decentralized coalition formation: (1) We establish a logarithmic lower bound on SPoA, and hence, show several previously known fair cost-sharing mechanisms are the best practical mechanisms with minimal SPoA. (2) We show that the SPoA of egalitarian and Nash bargaining cost-sharing mechanisms to match the lower bound. (3) We derive the SPoA of a mix of different cost-sharing mechanisms. (4) We present a decentralized algorithm to form a stable coalition structure. (5) Finally, we apply our general results to P2P energy sharing and present an empirical study of decentralized coalition formation in a real-world project. We study the empirical SPoA, which is observed within 95% of the social optimal cost with coalitions of 2 and 3 users, via fair cost-sharing mechanisms.
△ Less
Submitted 5 October, 2022; v1 submitted 18 September, 2020;
originally announced September 2020.
-
Planimation
Authors:
Gang Chen,
Yi Ding,
Hugo Edwards,
Chong Hin Chau,
Sai Hou,
Grace Johnson,
Mohammed Sharukh Syed,
Haoyuan Tang,
Yue Wu,
Ye Yan,
Gil Tidhar,
Nir Lipovetzky
Abstract:
Planimation is a modular and extensible open source framework to visualise sequential solutions of planning problems specified in PDDL. We introduce a preliminary declarative PDDL-like animation profile specification, expressive enough to synthesise animations of arbitrary initial states and goals of a benchmark with just a single profile.
Planimation is a modular and extensible open source framework to visualise sequential solutions of planning problems specified in PDDL. We introduce a preliminary declarative PDDL-like animation profile specification, expressive enough to synthesise animations of arbitrary initial states and goals of a benchmark with just a single profile.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.
-
Decentralized Ride-Sharing and Vehicle-Pooling Based on Fair Cost-Sharing Mechanisms
Authors:
Sid Chi-Kin Chau,
Shuning Shen,
Yue Zhou
Abstract:
Ride-sharing or vehicle-pooling allows commuters to team up spontaneously for transportation cost sharing. This has become a popular trend in the emerging paradigm of sharing economy. One crucial component to support effective ride-sharing is the matching mechanism that pairs up suitable commuters. Traditionally, matching has been performed in a centralized manner, whereby an operator arranges rid…
▽ More
Ride-sharing or vehicle-pooling allows commuters to team up spontaneously for transportation cost sharing. This has become a popular trend in the emerging paradigm of sharing economy. One crucial component to support effective ride-sharing is the matching mechanism that pairs up suitable commuters. Traditionally, matching has been performed in a centralized manner, whereby an operator arranges ride-sharing according to a global objective (e.g., total cost of all commuters). However, ride-sharing is a decentralized decision-making paradigm, where commuters are self-interested and only motivated to team up based on individual payments. Particularly, it is not clear how transportation cost should be shared fairly between commuters, and what ramifications of cost-sharing are on decentralized ride-sharing. This paper sheds light on the principles of decentralized ride-sharing and vehicle-pooling mechanisms based on stable matching, such that no one would be better off to deviate from a stable matching outcome. We study various fair cost-sharing mechanisms and the induced stable matching outcomes. We compare the stable matching outcomes with a social optimal outcome (that minimizes total cost) by theoretical bounds of social optimality ratios, and show that several fair cost-sharing mechanisms can achieve high social optimality. We also corroborate our results with an empirical study of taxi sharing under fair cost-sharing mechanisms by a data analysis on New York City taxi trip dataset, and provide useful insights on effective decentralized mechanisms for practical ride-sharing and vehicle-pooling.
△ Less
Submitted 18 September, 2020; v1 submitted 15 July, 2020;
originally announced July 2020.
-
Cloud-based Privacy-Preserving Collaborative Consumption for Sharing Economy
Authors:
Lingjuan Lyu,
Sid Chi-Kin Chau,
Nan Wang,
Yifeng Zheng
Abstract:
Cloud computing has been a dominant paradigm for a variety of information processing platforms, particularly for enabling various popular applications of sharing economy. However, there is a major concern regarding data privacy on these cloud-based platforms. This work presents novel cloud-based privacy-preserving solutions to support collaborative consumption applications for sharing economy. In…
▽ More
Cloud computing has been a dominant paradigm for a variety of information processing platforms, particularly for enabling various popular applications of sharing economy. However, there is a major concern regarding data privacy on these cloud-based platforms. This work presents novel cloud-based privacy-preserving solutions to support collaborative consumption applications for sharing economy. In typical collaborative consumption, information processing platforms need to enable fair cost-sharing among multiple users for utilizing certain shared facilities and communal services. Our cloud-based privacy-preserving protocols, based on homomorphic Paillier cryptosystems, can ensure that the cloud-based operator can only obtain an aggregate schedule of all users in facility sharing, or a service schedule conforming to service provision rule in communal service sharing, but is unable to track the personal schedules or demands of individual users. More importantly, the participating users are still able to settle cost-sharing among themselves in a fair manner for the incurred costs, without knowing each other's private schedules or demands. Our privacy-preserving protocols involve no other third party who may compromise privacy. We also provide an extensive evaluation study and a proof-of-concept system prototype of our protocols.
△ Less
Submitted 15 July, 2020;
originally announced July 2020.
-
Efficient Online Classification and Tracking on Resource-constrained IoT Devices
Authors:
Muhammad Aftab,
Sid Chi-Kin Chau,
Prashant Shenoy
Abstract:
Timely processing has been increasingly required on smart IoT devices, which leads to directly implementing information processing tasks on an IoT device for bandwidth savings and privacy assurance. Particularly, monitoring and tracking the observed signals in continuous form are common tasks for a variety of near real-time processing IoT devices, such as in smart homes, body-area and environmenta…
▽ More
Timely processing has been increasingly required on smart IoT devices, which leads to directly implementing information processing tasks on an IoT device for bandwidth savings and privacy assurance. Particularly, monitoring and tracking the observed signals in continuous form are common tasks for a variety of near real-time processing IoT devices, such as in smart homes, body-area and environmental sensing applications. However, these systems are likely low-cost resource-constrained embedded systems, equipped with compact memory space, whereby the ability to store the full information state of continuous signals is limited. Hence, in this paper, we develop solutions of efficient timely processing embedded systems for online classification and tracking of continuous signals with compact memory space. Particularly, we focus on the application of smart plugs that are capable of timely classification of appliance types and tracking of appliance behavior in a standalone manner. We implemented a smart plug prototype using low-cost Arduino platform with small amount of memory space to demonstrate the following timely processing operations: (1) learning and classifying the patterns associated with the continuous power consumption signals, and (2) tracking the occurrences of signal patterns using small local memory space. Furthermore, our system designs are also sufficiently generic for timely monitoring and tracking applications in other resource-constrained IoT devices.
△ Less
Submitted 2 April, 2020;
originally announced April 2020.
-
Efficient 3D Road Map Data Exchange for Intelligent Vehicles in Vehicular Fog Networks
Authors:
Ivan Wang-Hei Ho,
Sid Chi-Kin Chau,
Elmer R. Magsino,
Kanghao Jia
Abstract:
Through connecting intelligent vehicles as well as the roadside infrastructure, the perception range of vehicles can be significantly extended, and hidden objects at blind spots can be efficiently detected and avoided. To realize this, accurate road map data must be downloaded in real time to these intelligent vehicles for navigation and localization purposes. Besides, the cloud must be updated wi…
▽ More
Through connecting intelligent vehicles as well as the roadside infrastructure, the perception range of vehicles can be significantly extended, and hidden objects at blind spots can be efficiently detected and avoided. To realize this, accurate road map data must be downloaded in real time to these intelligent vehicles for navigation and localization purposes. Besides, the cloud must be updated with dynamic changes that happened in the road network. These involve the transmissions of high-definition 3D road map data for accurately representing the physical environments. In this work, we propose solutions under the fog computing architecture in a heterogeneous vehicular network to optimize data exchange among intelligent vehicles, the roadside infrastructure, as well as regional databases. Specifically, the efficiency of 3D road map data dissemination at roadside fog nodes is achieved by exploiting index coding techniques to reduce the overall data load, while opportunistic scheduling of heterogeneous transmissions can be done to judiciously manage network resources and minimize operating cost. In addition, 3D point cloud coding and hashing techniques are applied to expedite the updates of various dynamic changes in the network. We empirically evaluate the proposed solutions based on real-world mobility traces of vehicles and 3D LIght Detection And Ranging (LIDAR) data of city streets. The proposed system is also implemented in a multi-robotic testbed for practical evaluation.
△ Less
Submitted 12 January, 2020;
originally announced January 2020.
-
Stay or Switch: Competitive Online Algorithms for Energy Plan Selection in Energy Markets with Retail Choice
Authors:
Jianing Zhai,
Sid Chi-Kin Chau,
Minghua Chen
Abstract:
Energy markets with retail choice enable customers to switch energy plans among competitive retail suppliers. Despite the promising benefits of more affordable prices and better savings to customers, there appears subsided participation in energy retail markets from residential customers. One major reason is the complex online decision-making process for selecting the best energy plan from a multi…
▽ More
Energy markets with retail choice enable customers to switch energy plans among competitive retail suppliers. Despite the promising benefits of more affordable prices and better savings to customers, there appears subsided participation in energy retail markets from residential customers. One major reason is the complex online decision-making process for selecting the best energy plan from a multitude of options that hinders average consumers. In this paper, we shed light on the online energy plan selection problem by providing effective competitive online algorithms. We first formulate the online energy plan selection problem as a metrical task system problem with temporally dependent switching costs. For the case of constant cancellation fee, we present a 3-competitive deterministic online algorithm and a 2-competitive randomized online algorithm for solving the energy plan selection problem. We show that the two competitive ratios are the best possible among deterministic and randomized online algorithms, respectively. We further extend our online algorithms to the case where the cancellation fee is linearly proportional to the residual contract duration. Through empirical evaluations using real-world household and energy plan data, we show that our deterministic online algorithm can produce on average 14.6% cost saving, as compared to 16.2% by the offline optimal algorithm, while our randomized online algorithm can further improve cost saving by up to 0.5%.
△ Less
Submitted 18 June, 2024; v1 submitted 17 May, 2019;
originally announced May 2019.
-
Improving Viability of Electric Taxis by Taxi Service Strategy Optimization: A Big Data Study of New York City
Authors:
Chien-Ming Tseng,
Sid Chi-Kin Chau,
Xue Liu
Abstract:
Electrification of transportation is critical for a low-carbon society. In particular, public vehicles (e.g., taxis) provide a crucial opportunity for electrification. Despite the benefits of eco-friendliness and energy efficiency, adoption of electric taxis faces several obstacles, including constrained driving range, long recharging duration, limited charging stations and low gas price, all of w…
▽ More
Electrification of transportation is critical for a low-carbon society. In particular, public vehicles (e.g., taxis) provide a crucial opportunity for electrification. Despite the benefits of eco-friendliness and energy efficiency, adoption of electric taxis faces several obstacles, including constrained driving range, long recharging duration, limited charging stations and low gas price, all of which impede taxi drivers' decisions to switch to electric taxis. On the other hand, the popularity of ride-hailing mobile apps facilitates the computerization and optimization of taxi service strategies, which can provide computer-assisted decisions of navigation and roaming for taxi drivers to locate potential customers. This paper examines the viability of electric taxis with the assistance of taxi service strategy optimization, in comparison with conventional taxis with internal combustion engines. A big data study is provided using a large dataset of real-world taxi trips in New York City. Our methodology is to first model the computerized taxi service strategy by Markov Decision Process (MDP), and then obtain the optimized taxi service strategy based on NYC taxi trip dataset. The profitability of electric taxi drivers is studied empirically under various battery capacity and charging conditions. Consequently, we shed light on the solutions that can improve viability of electric taxis.
△ Less
Submitted 18 May, 2018; v1 submitted 25 September, 2017;
originally announced September 2017.
-
Combinatorial Optimization of AC Optimal Power Flow with Discrete Demands in Radial Networks
Authors:
Majid Khonji,
Sid Chi-Kin Chau,
Khaled Elbassion
Abstract:
The AC Optimal power flow (OPF) problem is one of the most fundamental problems in power systems engineering. For the past decades, researchers have been relying on unproven heuristics to tackle OPF. The hardness of OPF stems from two issues: (1) non-convexity and (2) combinatoric constraints (e.g., discrete power extraction constraints). The recent advances in providing sufficient conditions on t…
▽ More
The AC Optimal power flow (OPF) problem is one of the most fundamental problems in power systems engineering. For the past decades, researchers have been relying on unproven heuristics to tackle OPF. The hardness of OPF stems from two issues: (1) non-convexity and (2) combinatoric constraints (e.g., discrete power extraction constraints). The recent advances in providing sufficient conditions on the exactness of convex relaxation of OPF can address the issue of non-convexity. To complete the understanding of OPF, this paper presents a polynomial-time approximation algorithm to solve the convex-relaxed OPF with discrete demands as combinatoric constraints, which has a provably small parameterized approximation ratio (also known as PTAS algorithm). Together with the sufficient conditions on the exactness of the convex relaxation, we provide an efficient approximation algorithm to solve OPF with discrete demands, when the underlying network is radial with a fixed size and one feeder. The running time of PTAS is $O(n^{4m/ε}T)$, where $T$ is the time required to solve a convex relaxation of the problem, and $m, ε$ are fixed constants. Based on prior hardness results of OPF, our PTAS is among the best achievable in theory. Simulations show our algorithm can produce close-to-optimal solutions in practice.
△ Less
Submitted 15 October, 2019; v1 submitted 25 September, 2017;
originally announced September 2017.
-
Approximations for Generalized Unsplittable Flow on Paths with Application to Power Systems Optimization
Authors:
Areg Karapetyan,
Khaled Elbassioni,
Majid Khonji,
Chi-Kin Chau
Abstract:
The Unsplittable Flow on a Path (UFP) problem has garnered considerable attention as a challenging combinatorial optimization problem with notable practical implications. Steered by its pivotal applications in power engineering, the present work formulates a novel generalization of UFP, wherein demands and capacities in the input instance are monotone step functions over the set of edges. As an in…
▽ More
The Unsplittable Flow on a Path (UFP) problem has garnered considerable attention as a challenging combinatorial optimization problem with notable practical implications. Steered by its pivotal applications in power engineering, the present work formulates a novel generalization of UFP, wherein demands and capacities in the input instance are monotone step functions over the set of edges. As an initial step towards tackling this generalization, we draw on and extend ideas from prior research to devise a quasi-polynomial time approximation scheme (QPTAS) under the premise that the demands and capacities lie in a quasi-polynomial range. Second, retaining the same assumption, an efficient logarithmic approximation is introduced for the single-source variant of the problem. Finally, we round up the contributions by designing a (kind of) black-box reduction that, under some mild conditions, allows to translate LP-based approximation algorithms for the studied problem into their counterparts for the Alternating Current Optimal Power Flow (AC OPF) problem -- a fundamental workflow in operation and control of power systems.
△ Less
Submitted 26 October, 2022; v1 submitted 18 September, 2017;
originally announced September 2017.
-
Enabling Self-aware Smart Buildings by Augmented Reality
Authors:
Muhammad Aftab,
Sid Chi-Kin Chau,
Majid Khonji
Abstract:
Conventional HVAC control systems are usually incognizant of the physical structures and materials of buildings. These systems merely follow pre-set HVAC control logic based on abstract building thermal response models, which are rough approximations to true physical models, ignoring dynamic spatial variations in built environments. To enable more accurate and responsive HVAC control, this paper i…
▽ More
Conventional HVAC control systems are usually incognizant of the physical structures and materials of buildings. These systems merely follow pre-set HVAC control logic based on abstract building thermal response models, which are rough approximations to true physical models, ignoring dynamic spatial variations in built environments. To enable more accurate and responsive HVAC control, this paper introduces the notion of "self-aware" smart buildings, such that buildings are able to explicitly construct physical models of themselves (e.g., incorporating building structures and materials, and thermal flow dynamics). The question is how to enable self-aware buildings that automatically acquire dynamic knowledge of themselves. This paper presents a novel approach using "augmented reality". The extensive user-environment interactions in augmented reality not only can provide intuitive user interfaces for building systems, but also can capture the physical structures and possibly materials of buildings accurately to enable real-time building simulation and control. This paper presents a building system prototype incorporating augmented reality, and discusses its applications.
△ Less
Submitted 21 May, 2018; v1 submitted 17 August, 2017;
originally announced August 2017.
-
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
Authors:
Rashid Alyassi,
Majid Khonji,
Areg Karapetyan,
Sid Chi-Kin Chau,
Khaled Elbassioni,
Chien-Ming Tseng
Abstract:
Unmanned aerial vehicles (UAVs), commonly known as drones, are being increasingly deployed throughout the globe as a means to streamline monitoring, inspection, map**, and logistic routines. When dispatched on autonomous missions, drones require an intelligent decision-making system for trajectory planning and tour optimization. Given the limited capacity of their onboard batteries, a key design…
▽ More
Unmanned aerial vehicles (UAVs), commonly known as drones, are being increasingly deployed throughout the globe as a means to streamline monitoring, inspection, map**, and logistic routines. When dispatched on autonomous missions, drones require an intelligent decision-making system for trajectory planning and tour optimization. Given the limited capacity of their onboard batteries, a key design challenge is to ensure the underlying algorithms can efficiently optimize the mission objectives along with recharging operations during long-haul flights. With this in view, the present work undertakes a comprehensive study on automated tour management systems for an energy-constrained drone: (1) We construct a machine learning model that estimates the energy expenditure of typical multi-rotor drones while accounting for real-world aspects and extrinsic meteorological factors. (2) Leveraging this model, the joint program of flight mission planning and recharging optimization is formulated as a multi-criteria Asymmetric Traveling Salesman Problem (ATSP), wherein a drone seeks for the time-optimal energy-feasible tour that visits all the target sites and refuels whenever necessary. (3) We devise an efficient approximation algorithm with provable worst-case performance guarantees and implement it in a drone management system, which supports real-time flight path tracking and re-computation in dynamic environments. (4) The effectiveness and practicality of the proposed approach are validated through extensive numerical simulations as well as real-world experiments.
△ Less
Submitted 19 April, 2022; v1 submitted 29 March, 2017;
originally announced March 2017.
-
Drive Mode Optimization and Path Planning for Plug-in Hybrid Electric Vehicles
Authors:
Chi-Kin Chau,
Khaled Elbassioni,
Chien-Ming Tseng
Abstract:
Drive modes are driver-selectable pre-set configurations of powertrain and certain vehicle parameters. Plug-in hybrid electric vehicles (PHEVs) typically feature special options of drive modes that can affect the hybrid energy source management system, for example, electric vehicle (EV) mode (that draws fully on battery) and charge sustaining (CS) mode (that utilizes internal combustion engine to…
▽ More
Drive modes are driver-selectable pre-set configurations of powertrain and certain vehicle parameters. Plug-in hybrid electric vehicles (PHEVs) typically feature special options of drive modes that can affect the hybrid energy source management system, for example, electric vehicle (EV) mode (that draws fully on battery) and charge sustaining (CS) mode (that utilizes internal combustion engine to charge battery while propelling the vehicle). This paper studies an optimization problem to enable the driver to select the appropriate drive modes for fuel minimization. We develop optimization algorithms that optimize the decisions of drive modes based on trip information, and integrated with path planning to find an optimal path, considering intermediate filling and charging stations. We further provide an online algorithm that is based on the revealed trip information. We evaluate our algorithms empirically on a Chevrolet Volt, which shows significant fuel savings.
△ Less
Submitted 4 April, 2017; v1 submitted 2 November, 2016;
originally announced November 2016.
-
Online Algorithm for Demand Response with Inelastic Demands and Apparent Power Constraint
Authors:
Areg Karapetyan,
Majid Khonji,
Chi-Kin Chau,
Khaled Elbassioni
Abstract:
A classical problem in power systems is to allocate in-coming (elastic or inelastic) demands without violating the operating constraints of electric networks in an online fashion. Although online decision problems have been well-studied in the literature, a unique challenge arising in power systems is the presence of non-linear constraints, a departure from the traditional settings. A particular e…
▽ More
A classical problem in power systems is to allocate in-coming (elastic or inelastic) demands without violating the operating constraints of electric networks in an online fashion. Although online decision problems have been well-studied in the literature, a unique challenge arising in power systems is the presence of non-linear constraints, a departure from the traditional settings. A particular example is the capacity constraint of apparent power, which gives rise to a quadratic constraint, rather than typical linear constraints. In this paper, we present a competitive randomized online algorithm for deciding whether a sequence of inelastic demands can be allocated for the requested intervals, subject to the total satisfiable apparent power within a time-varying capacity constraint. We also consider an alternative setting with nodal voltage constraint, using a variant of the online algorithm. Finally, simulation studies are provided to evaluate the algorithms empirically.
△ Less
Submitted 25 October, 2021; v1 submitted 2 November, 2016;
originally announced November 2016.
-
Efficient Algorithm for Scalable Event-based Demand Response Management in Microgrids
Authors:
Areg Karapetyan,
Majid Khonji,
Chi-Kin Chau,
Khaled Elbassioni,
H. H. Zeineldin
Abstract:
Demand response management has become one of the key enabling technologies for smart grids. Motivated by the increasing demand response incentives offered by service operators, more customers are subscribing to various demand response programs. However, with growing customer participation, the problem of determining the optimal loads to be curtailed in a microgrid during contingencies within a fea…
▽ More
Demand response management has become one of the key enabling technologies for smart grids. Motivated by the increasing demand response incentives offered by service operators, more customers are subscribing to various demand response programs. However, with growing customer participation, the problem of determining the optimal loads to be curtailed in a microgrid during contingencies within a feasible time frame becomes computationally hard. This paper proposes an efficient approximation algorithm for event-based demand response management in microgrids. In event-based management, it is important to curtail loads as fast as possible to maintain the stability of a microgrid during the islanded mode in a scalable manner. A simple greedy approach is presented that can rapidly determine a close-to-optimal load curtailment scheme to maximize the aggregate customer utility in milliseconds for a large number of customers. This paper further derives a novel theoretical guarantee of the gap between the proposed efficient algorithm and the optimal solution (that may be computationally hard to obtain). The performance of algorithm is corroborated extensively by simulations with up to thousands of customers. For the sake of practicality, the proposed event-based demand response management algorithm is applied to a feeder from the Canadian benchmark distribution system. The simulation results demonstrate that the proposed approach efficiently optimizes microgrid operation during islanded mode while maintaining appropriate voltage levels and network constrains.
△ Less
Submitted 10 October, 2016;
originally announced October 2016.
-
Personalized Prediction of Vehicle Energy Consumption based on Participatory Sensing
Authors:
Chien-Ming Tseng,
Chi-Kin Chau
Abstract:
The advent of abundant on-board sensors and electronic devices in vehicles populates the paradigm of participatory sensing to harness crowd-sourced data gathering for intelligent transportation applications, such as distance-to-empty prediction and eco-routing. While participatory sensing can provide diverse driving data, there lacks a systematic study of effective utilization of the data for pers…
▽ More
The advent of abundant on-board sensors and electronic devices in vehicles populates the paradigm of participatory sensing to harness crowd-sourced data gathering for intelligent transportation applications, such as distance-to-empty prediction and eco-routing. While participatory sensing can provide diverse driving data, there lacks a systematic study of effective utilization of the data for personalized prediction. There are considerable challenges on how to interpolate the missing data from a sparse dataset, which often arises from participatory sensing. This paper presents and compares various approaches for personalized vehicle energy consumption prediction, including a blackbox framework that identifies driver/vehicle/environment-dependent factors and a collaborative filtering approach based on matrix factorization. Furthermore, a case study of distance-to-empty prediction for electric vehicles by participatory sensing data is conducted and evaluated empirically, which shows that our approaches can significantly improve the prediction accuracy.
△ Less
Submitted 20 February, 2017; v1 submitted 1 October, 2016;
originally announced October 2016.
-
Complex-demand Scheduling Problem with Application in Smart Grid
Authors:
Majid Khonji,
Areg Karapetyan,
Khaled Elbassioni,
Sid Chi-Kin Chau
Abstract:
We consider the problem of scheduling complex-valued demands over a discretized time horizon. Given a set of users, each user is associated with a set of demands representing different power consumption preferences. A demand is represented by a complex number, a time interval, and a utility value obtained if it is satisfied. At each time slot, the magnitude of the total selected demands should not…
▽ More
We consider the problem of scheduling complex-valued demands over a discretized time horizon. Given a set of users, each user is associated with a set of demands representing different power consumption preferences. A demand is represented by a complex number, a time interval, and a utility value obtained if it is satisfied. At each time slot, the magnitude of the total selected demands should not exceed a given generation capacity. This naturally captures the supply constraints in alternating current (AC) electric systems. In this paper, we consider maximizing the aggregate user utility subject to power supply limits over a time horizon. We present approximation algorithms characterized by the maximum angle $φ$ between any two complex-valued demands. More precisely, a PTAS is presented for the case $φ\in [0,\tfracπ{2}]$, a bi-criteria FPTAS for $φ\in [0,π \mbox{-} \varepsilon]$ for any polynomially small $\varepsilon$, assuming the number of time slots in the discretized time horizon is a constant. Furthermore, if the number of time slots is part of the input, we present a reduction to the real-valued unsplittable flow problem on a path with only a constant approximation ratio. Finally, we present a practical greedy algorithm for the single time slot case with an approximation ratio of $\tfrac{1}{2}\cos \fracφ{2}$ and a running time complexity of only ${O}(N\log N)$, $N$ standing for the aggregate number of user demands, which can be implemented efficiently in practice.
△ Less
Submitted 9 October, 2018; v1 submitted 5 March, 2016;
originally announced March 2016.
-
Effective Static and Adaptive Carrier Sensing for Dense Wireless CSMA Networks
Authors:
Chi-Kin Chau,
Ivan W. H. Ho,
Zhenhui Situ,
Soung Chang Liew,
Jialiang Zhang
Abstract:
The increasingly dense deployments of wireless CSMA networks arising from applications of Internet-of-things call for an improvement to mitigate the interference among simultaneous transmitting wireless devices. For cost efficiency and backward compatibility with legacy transceiver hardware, a simple approach to address interference is by appropriately configuring the carrier sensing thresholds in…
▽ More
The increasingly dense deployments of wireless CSMA networks arising from applications of Internet-of-things call for an improvement to mitigate the interference among simultaneous transmitting wireless devices. For cost efficiency and backward compatibility with legacy transceiver hardware, a simple approach to address interference is by appropriately configuring the carrier sensing thresholds in wireless CSMA protocols, particularly in dense wireless networks. Most prior studies of the configuration of carrier sensing thresholds are based on a simplified conflict graph model, whereas this paper considers a realistic signal-to-interference-and-noise ratio model. We provide a comprehensive study for two effective wireless CSMA protocols: Cumulative-interference-Power Carrier Sensing and Incremental-interference-Power Carrier Sensing, in two aspects: (1) static approach that sets a universal carrier sensing threshold to ensure interference-safe transmissions regardless of network topology, and (2) adaptive approach that adjusts the carrier sensing thresholds dynamically based on the feedback of nearby transmissions. We also provide simulation studies to evaluate the starvation ratio, fairness, and goodput of our approaches.
△ Less
Submitted 11 October, 2016; v1 submitted 23 February, 2016;
originally announced February 2016.
-
Online Algorithms for Information Aggregation from Distributed and Correlated Sources
Authors:
Chi-Kin Chau,
Majid Khonji,
Muhammad Aftab
Abstract:
There is a fundamental trade-off between the communication cost and latency in information aggregation. Aggregating multiple communication messages over time can alleviate overhead and improve energy efficiency on one hand, but inevitably incurs information delay on the other hand. In the presence of uncertain future inputs, this trade-off should be balanced in an online manner, which is studied b…
▽ More
There is a fundamental trade-off between the communication cost and latency in information aggregation. Aggregating multiple communication messages over time can alleviate overhead and improve energy efficiency on one hand, but inevitably incurs information delay on the other hand. In the presence of uncertain future inputs, this trade-off should be balanced in an online manner, which is studied by the classical dynamic TCP ACK problem for a single information source. In this paper, we extend dynamic TCP ACK problem to a general setting of collecting aggregate information from distributed and correlated information sources. In this model, distributed sources observe correlated events, whereas only a small number of reports are required from the sources. The sources make online decisions about their reporting operations in a distributed manner without prior knowledge of the local observations at others. Our problem captures a wide range of applications, such as in-situ sensing, anycast acknowledgement and distributed caching. We present simple threshold-based competitive distributed online algorithms under different settings of intercommunication. Our algorithms match the theoretical lower bounds in order of magnitude. We observe that our algorithms can produce satisfactory performance in simulations and practical testbed.
△ Less
Submitted 13 April, 2016; v1 submitted 13 January, 2016;
originally announced January 2016.
-
Optimal Power Flow with Inelastic Demands for Demand Response in Radial Distribution Networks
Authors:
Majid Khonji,
Chi-Kin Chau,
Khaled Elbassioni
Abstract:
The classical optimal power flow problem optimizes the power flow in a power network considering the associated flow and operating constraints. In this paper, we investigate optimal power flow in the context of utility-maximizing demand response management in distribution networks, in which customers' demands are satisfied subject to the operating constraints of voltage and transmission power capa…
▽ More
The classical optimal power flow problem optimizes the power flow in a power network considering the associated flow and operating constraints. In this paper, we investigate optimal power flow in the context of utility-maximizing demand response management in distribution networks, in which customers' demands are satisfied subject to the operating constraints of voltage and transmission power capacity. The prior results concern only elastic demands that can be partially satisfied, whereas power demands in practice can be inelastic with binary control decisions, which gives rise to a mixed integer programming problem. We shed light on the hardness and approximability by polynomial-time algorithms for optimal power flow problem with inelastic demands. We show that this problem is inapproximable for general power network topology with upper and lower bounds of nodal voltage. Then, we propose an efficient algorithm for a relaxed problem in radial networks with bounded transmission power loss and upper bound of nodal voltage. We derive an approximation ratio between the proposed algorithm and the exact optimal solution. Simulations show that the proposed algorithm can produce close-to-optimal solutions in practice.
△ Less
Submitted 3 November, 2016; v1 submitted 11 January, 2016;
originally announced January 2016.
-
Cost Minimizing Online Algorithms for Energy Storage Management with Worst-case Guarantee
Authors:
Chi-Kin Chau,
Guanglin Zhang,
Minghua Chen
Abstract:
The fluctuations of electricity prices in demand response schemes and intermittency of renewable energy supplies necessitate the adoption of energy storage in microgrids. However, it is challenging to design effective real-time energy storage management strategies that can deliver assured optimality, without being hampered by the uncertainty of volatile electricity prices and renewable energy supp…
▽ More
The fluctuations of electricity prices in demand response schemes and intermittency of renewable energy supplies necessitate the adoption of energy storage in microgrids. However, it is challenging to design effective real-time energy storage management strategies that can deliver assured optimality, without being hampered by the uncertainty of volatile electricity prices and renewable energy supplies. This paper presents a simple effective online algorithm for the charging and discharging decisions of energy storage that minimizes the electricity cost in the presence of electricity price fluctuations and renewable energy supplies, without relying on the future information of prices, demands or renewable energy supplies. The proposed algorithm is supported by a near-best worst-case guarantee (i.e., competitive ratio), as compared to the offline optimal decisions based on full future information. Furthermore, the algorithm can be adapted to take advantage of limited future information, if available. By simulations on real-world data, it is observed that the proposed algorithms can achieve satisfactory outcome in practice.
△ Less
Submitted 3 January, 2016; v1 submitted 23 November, 2015;
originally announced November 2015.
-
Quantifying Inefficiency of Fair Cost-Sharing Mechanisms for Sharing Economy
Authors:
Chi-Kin Chau,
Khaled Elbassioni
Abstract:
Sharing economy is a distributed peer-to-peer economic paradigm, which gives rise to a variety of social interactions for economic purposes. One fundamental distributed decision-making process is coalition formation for sharing certain replaceable resources collaboratively, for example, sharing hotel rooms among travelers, sharing taxi-rides among passengers, and sharing regular passes among users…
▽ More
Sharing economy is a distributed peer-to-peer economic paradigm, which gives rise to a variety of social interactions for economic purposes. One fundamental distributed decision-making process is coalition formation for sharing certain replaceable resources collaboratively, for example, sharing hotel rooms among travelers, sharing taxi-rides among passengers, and sharing regular passes among users. Motivated by the applications of sharing economy, this paper studies a coalition formation game subject to the capacity of $K$ participants per coalition. The participants in each coalition are supposed to split the associated cost according to a given cost-sharing mechanism. A stable coalition structure is established when no group of participants can opt out to form another coalition that leads to lower individual payments. We quantify the inefficiency of distributed decision-making processes under a cost-sharing mechanism by the strong price of anarchy (SPoA), comparing a worst-case stable coalition structure and a social optimum. In particular, we derive SPoA for common fair cost-sharing mechanisms (e.g., equal-split, proportional-split, egalitarian and Nash bargaining solutions of bargaining games, and usage based cost-sharing). We show that the SPoA for equal-split, proportional-split, and usage based cost-sharing (under certain conditions) is $Θ(\log K)$, whereas the one for egalitarian and Nash bargaining solutions is $O(\sqrt{K} \log K)$. Therefore, distributed decision-making processes under common fair cost-sharing mechanisms induce only moderate inefficiency.
△ Less
Submitted 16 October, 2017; v1 submitted 16 November, 2015;
originally announced November 2015.
-
Fourier Series Formalization in ACL2(r)
Authors:
Cuong K. Chau,
Matt Kaufmann,
Warren A. Hunt Jr.
Abstract:
We formalize some basic properties of Fourier series in the logic of ACL2(r), which is a variant of ACL2 that supports reasoning about the real and complex numbers by way of non-standard analysis. More specifically, we extend a framework for formally evaluating definite integrals of real-valued, continuous functions using the Second Fundamental Theorem of Calculus. Our extended framework is also a…
▽ More
We formalize some basic properties of Fourier series in the logic of ACL2(r), which is a variant of ACL2 that supports reasoning about the real and complex numbers by way of non-standard analysis. More specifically, we extend a framework for formally evaluating definite integrals of real-valued, continuous functions using the Second Fundamental Theorem of Calculus. Our extended framework is also applied to functions containing free arguments. Using this framework, we are able to prove the orthogonality relationships between trigonometric functions, which are the essential properties in Fourier series analysis. The sum rule for definite integrals of indexed sums is also formalized by applying the extended framework along with the First Fundamental Theorem of Calculus and the sum rule for differentiation. The Fourier coefficient formulas of periodic functions are then formalized from the orthogonality relations and the sum rule for integration. Consequently, the uniqueness of Fourier sums is a straightforward corollary.
We also present our formalization of the sum rule for definite integrals of infinite series in ACL2(r). Part of this task is to prove the Dini Uniform Convergence Theorem and the continuity of a limit function under certain conditions. A key technique in our proofs of these theorems is to apply the overspill principle from non-standard analysis.
△ Less
Submitted 20 September, 2015;
originally announced September 2015.
-
Economic Viability of Paris Metro Pricing for Digital Services
Authors:
Chi-Kin Chau,
Qian Wang,
Dah-Ming Chiu
Abstract:
Nowadays digital services, such as cloud computing and network access services, allow dynamic resource allocation and virtual resource isolation. This trend can create a new paradigm of flexible pricing schemes. A simple pricing scheme is to allocate multiple isolated service classes with differentiated prices, namely Paris Metro Pricing (PMP). The benefits of PMP are its simplicity and applicabil…
▽ More
Nowadays digital services, such as cloud computing and network access services, allow dynamic resource allocation and virtual resource isolation. This trend can create a new paradigm of flexible pricing schemes. A simple pricing scheme is to allocate multiple isolated service classes with differentiated prices, namely Paris Metro Pricing (PMP). The benefits of PMP are its simplicity and applicability to a wide variety of general digital services, without considering specific performance guarantees for different service classes. The central issue of our study is whether PMP is economically viable, namely whether it will produce more profit for the service provider and whether it will achieve more social welfare. Prior studies had only considered specific models and arrived at conflicting conclusions. In this article, we identify unifying principles in a general setting and derive general sufficient conditions that can guarantee the viability of PMP. We further apply the results to analyze various examples of digital services.
△ Less
Submitted 7 July, 2015;
originally announced July 2015.
-
Truthful Mechanisms for Combinatorial Allocation of Electric Power in Alternating Current Electric Systems for Smart Grid
Authors:
Chi-Kin Chau,
Khaled Elbassioni,
Majid Khonji
Abstract:
Traditional studies of combinatorial auctions often only consider linear constraints. The rise of smart grid presents a new class of auctions, characterized by quadratic constraints. This paper studies the {\em complex-demand knapsack problem}, in which the demands are complex valued and the capacity of supplies is described by the magnitude of total complex-valued demand. This naturally captures…
▽ More
Traditional studies of combinatorial auctions often only consider linear constraints. The rise of smart grid presents a new class of auctions, characterized by quadratic constraints. This paper studies the {\em complex-demand knapsack problem}, in which the demands are complex valued and the capacity of supplies is described by the magnitude of total complex-valued demand. This naturally captures the power constraints in alternating current (AC) electric systems. In this paper, we provide a more complete study and generalize the problem to the multi-minded version, beyond the previously known $\frac{1}{2}$-approximation algorithm for only a subclass of the problem. More precisely, we give a truthful PTAS for the case $φ\in[0,\fracπ{2}-δ]$, and a truthful FPTAS, which {\it fully} optimizes the objective function but violates the capacity constraint by at most $(1+ε)$, for the case $φ\in(\fracπ{2},π-δ]$, where $φ$ is the maximum argument of any complex-valued demand and $ε,δ>0$ are arbitrarily small constants. We complement these results by showing that, unless P=NP, neither a PTAS for the case $φ\in(\fracπ{2},π-δ]$ nor any bi-criteria approximation algorithm with polynomial guarantees for the case when $φ$ is arbitrarily close to $π$ (that is, when $δ$ is arbitrarily close to $0$) can exist.
△ Less
Submitted 3 November, 2016; v1 submitted 7 July, 2015;
originally announced July 2015.
-
Truthful Mechanisms for Combinatorial AC Electric Power Allocation
Authors:
Chi-Kin Chau,
Khaled Elbassioni,
Majid Khonji
Abstract:
Traditional studies of combinatorial auctions often only consider linear constraints (by which the demands for certain goods are limited by the corresponding supplies). The rise of smart grid presents a new class of auctions, characterized by quadratic constraints. Yu and Chau [AAMAS 13'] introduced the complex-demand knapsack problem, in which the demands are complex-valued and the capacity of su…
▽ More
Traditional studies of combinatorial auctions often only consider linear constraints (by which the demands for certain goods are limited by the corresponding supplies). The rise of smart grid presents a new class of auctions, characterized by quadratic constraints. Yu and Chau [AAMAS 13'] introduced the complex-demand knapsack problem, in which the demands are complex-valued and the capacity of supplies is described by the magnitude of total complex-valued demand. This naturally captures the power constraints in AC electric systems. In this paper, we provide a more complete study and generalize the problem to the multi-minded version, beyond the previously known 1/2-approximation algorithm for only a subclass of the problem. More precisely, we give a truthful PTAS for the case phi in [0,pi/2-delta], and a truthful FPTAS, which fully optimizes the objective function but violates the capacity constraint by at most (1+epsilon), for the case phi in (pi/2,pi-delta], where phi is the maximum angle between any two complex-valued demands and epsilon,delta>0 are arbitrarily small constants.
△ Less
Submitted 26 November, 2014; v1 submitted 16 March, 2014;
originally announced March 2014.
-
Online Energy Generation Scheduling for Microgrids with Intermittent Energy Sources and Co-Generation
Authors:
Lian Lu,
**long Tu,
Chi-Kin Chau,
Minghua Chen,
Xiaojun Lin
Abstract:
Microgrids represent an emerging paradigm of future electric power systems that can utilize both distributed and centralized generations. Two recent trends in microgrids are the integration of local renewable energy sources (such as wind farms) and the use of co-generation (i.e., to supply both electricity and heat). However, these trends also bring unprecedented challenges to the design of intell…
▽ More
Microgrids represent an emerging paradigm of future electric power systems that can utilize both distributed and centralized generations. Two recent trends in microgrids are the integration of local renewable energy sources (such as wind farms) and the use of co-generation (i.e., to supply both electricity and heat). However, these trends also bring unprecedented challenges to the design of intelligent control strategies for microgrids. Traditional generation scheduling paradigms rely on perfect prediction of future electricity supply and demand. They are no longer applicable to microgrids with unpredictable renewable energy supply and with co-generation (that needs to consider both electricity and heat demand). In this paper, we study online algorithms for the microgrid generation scheduling problem with intermittent renewable energy sources and co-generation, with the goal of maximizing the cost-savings with local generation. Based on the insights from the structure of the offline optimal solution, we propose a class of competitive online algorithms, called CHASE (Competitive Heuristic Algorithm for Scheduling Energy-generation), that track the offline optimal in an online fashion. Under typical settings, we show that CHASE achieves the best competitive ratio among all deterministic online algorithms, and the ratio is no larger than a small constant 3.
△ Less
Submitted 25 April, 2013; v1 submitted 19 November, 2012;
originally announced November 2012.
-
Complex-Demand Knapsack Problems and Incentives in AC Power Systems
Authors:
Lan Yu,
Chi-Kin Chau
Abstract:
We consider AC electrical systems where each electrical device has a power demand expressed as a complex number, and there is a limit on the magnitude of total power supply. Motivated by this scenario, we introduce the complex-demand knapsack problem (C-KP), a new variation of the traditional knapsack problem, where each item is associated with a demand as a complex number, rather than a real numb…
▽ More
We consider AC electrical systems where each electrical device has a power demand expressed as a complex number, and there is a limit on the magnitude of total power supply. Motivated by this scenario, we introduce the complex-demand knapsack problem (C-KP), a new variation of the traditional knapsack problem, where each item is associated with a demand as a complex number, rather than a real number often interpreted as weight or size of the item. While kee** the same goal as to maximize the sum of values of the selected items, we put the capacity limit on the magnitude of the sum of satisfied demands. For C-KP, we prove its inapproximability by FPTAS (unless P = NP), as well as presenting a (1/2-epsilon)-approximation algorithm. Furthermore, we investigate the selfish multi-agent setting where each agent is in charge of one item, and an agent may misreport the demand and value of his item for his own interest. We show a simple way to adapt our approximation algorithm to be monotone, which is sufficient for the existence of incentive compatible payments such that no agent has an incentive to misreport. Our results shed insight on the design of multi-agent systems for smart grid.
△ Less
Submitted 26 January, 2014; v1 submitted 10 May, 2012;
originally announced May 2012.
-
Analysis of Frequency-Agile CSMA Wireless Networks
Authors:
Soung Chang Liew,
Jialiang Zhang,
Chi-Kin Chau,
Minghua Chen
Abstract:
This paper proposes and analyzes the performance of a simple frequency-agile CSMA MAC protocol. In this MAC, a node carrier-senses multiple frequency channels simultaneously, and it takes the first opportunity to transmit on any one of the channels when allowed by the CSMA backoff mechanism. We show that the frequency-agile MAC can effectively 1) boost throughput and 2) remove temporal starvation.…
▽ More
This paper proposes and analyzes the performance of a simple frequency-agile CSMA MAC protocol. In this MAC, a node carrier-senses multiple frequency channels simultaneously, and it takes the first opportunity to transmit on any one of the channels when allowed by the CSMA backoff mechanism. We show that the frequency-agile MAC can effectively 1) boost throughput and 2) remove temporal starvation. Furthermore, the MAC can be implemented on the existing multiple-frequency setup in Wi-Fi using multi-radio technology, and it can co-exist with the legacy MAC using single radio. This paper provides exact stationary throughput analysis for regular 1D and thin-strip 2D CSMA networks using a "transfer-matrix" approach. In addition, accurate approximations are given for 2D grid networks. Our closed-form formulas accurately quantify the throughput gain of frequency-agile CSMA. To characterize temporal starvation, we use the metric of "mean residual access time" (MRAT). Our simulations and closed-form approximations indicate that the frequency-agile MAC can totally eliminate temporal starvation in 2D grid networks, reducing its MRAT by orders of magnitude. Finally, this paper presents a "coloring theorem" to justify the use of the frequency-agile MAC in general network topologies. Our analysis and theorem suggest that with enough frequency channels, the frequency-agile MAC can effectively decouple the detrimental interactions between neighboring links responsible for low throughput and starvation.
△ Less
Submitted 29 July, 2010;
originally announced July 2010.
-
Capacity of Large-scale CSMA Wireless Networks
Authors:
Chi-Kin Chau,
Minghua Chen,
Soung Chang Liew
Abstract:
In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schemes. There have been fewer studies of the asymptotic capacity of large-scale wireless networks based on CSMA (carrier-sensing multi-access), which schedules transmissions in a distributed and random manner. With the rapid…
▽ More
In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schemes. There have been fewer studies of the asymptotic capacity of large-scale wireless networks based on CSMA (carrier-sensing multi-access), which schedules transmissions in a distributed and random manner. With the rapid and widespread adoption of CSMA technology, a critical question is that whether CSMA networks can be as scalable as TDMA networks. To answer this question and explore the capacity of CSMA networks, we first formulate the models of CSMA protocols to take into account the unique CSMA characteristics not captured by existing interference models in the literature. These CSMA models determine the feasible states, and consequently the capacity of CSMA networks. We then study the throughput efficiency of CSMA scheduling as compared to TDMA. Finally, we tune the CSMA parameters so as to maximize the throughput to the optimal order. As a result, we show that CSMA can achieve throughput as $Ω(\frac{1}{\sqrt{n}})$, the same order as optimal centralized TDMA, on uniform random networks. Our CSMA scheme makes use of an efficient backbone-peripheral routing scheme and a careful design of dual carrier-sensing and dual channel scheme. We also address the implementation issues of our CSMA scheme.
△ Less
Submitted 17 May, 2010; v1 submitted 18 September, 2009;
originally announced September 2009.