This paper addresses the control synthesis of heterogeneous stochastic linear multi-agent systems with real-time allocation of signal temporal logic (STL) specifications. Based on previous work, we decompose specifica...
详细信息
We consider word-of-mouth social learning involving m Kalman filter agents that operate sequentially. The first Kalman filter receives the raw observations, while each subsequent Kalman filter receives a noisy measure...
详细信息
Network emulators and simulation environments traditionally support computer networking and distributed system research. The continued use of multiple approaches highlights both the value and inadequacy of each approa...
Network emulators and simulation environments traditionally support computer networking and distributed system research. The continued use of multiple approaches highlights both the value and inadequacy of each approach. To this end, several large-scale virtual networks testbeds, such as GENI and CloudLab, have emerged, allowing testing of a networked system in controlled yet realistic environments, focusing in particular on facilitating the test of network management schema in Software-Defined Network (SDN) scenarios. Nevertheless, setting up those experiments first and integrating machine learning models later in these deployments is challenging. In this paper, we propose designing and implementing a web-based platform that integrates Reinforcement Learning (RL)-based models with a virtual network experiment using resources acquired within a real-world testbed, e.g., GENI. Users are able to reserve the network resources (links, switches, and hosts) and configure them through our intuitive interface with little effort. The RL algorithm is then launched to learn how to steer traffic dynamically and according to diverse traffic network conditions. Such a model can be easily customized by the user, while our architecture enables fast reprogramming of the Open Virtual Switches via the SDN controller instantiated. We experimented with trace-based traffic to validate this user-friendly platform and evaluated how centralized and decentralized RL algorithms can effectively lead to self-driving networks. While in this paper, the system focuses on the deployment of experiments for virtual network adaptation, the platform can be easily extended to other network management mechanisms and machine learning algorithms.
The article is focused on design of specific electromagnetic coil system using numerical modelling and simulation methods. The proposed solution would be capable of delivering magnetic field of desired strength/ flux ...
详细信息
Years of research on congestion controls have highlighted how end-to-end and in-network protocols might perform poorly in some contexts. Recent advances in data plane network programmability could also bring advantage...
Years of research on congestion controls have highlighted how end-to-end and in-network protocols might perform poorly in some contexts. Recent advances in data plane network programmability could also bring advantages in transport protocols, enabling mining and processing in-network congestion signals. However, the new machine learning-based congestion control class has only partially used data from the network, favoring a more sophisticated model design but neglecting possibly precious pieces of data. In this paper, we present HINT, an in-band network telemetry architecture designed to provide insights into network congestion to the end-host TCP algorithm during the learning process. In particular, the key idea is to adapt switches’ behavior via P4 and instruct them to insert simple device information, such as processing delay and queue occupancy, directly into transferred packets. Initial experimental results show that this approach comes with a little network overhead but can improve the visibility and, consequently, the accuracy of TCP decisions of the end-host. At the same time, the programmability of both switches and hosts also enables customization of the default behavior as the user’s needs change.
Traffic matrices are used for many network management operations, from planning to repairing. Despite years of research on the topic, their estimation and inference on the Internet are still challenging and error-pron...
详细信息
Traffic matrices are used for many network management operations, from planning to repairing. Despite years of research on the topic, their estimation and inference on the Internet are still challenging and error-prone. For example, missing values are unavoidable due to flaws in the measurement systems and possible failure in data collection systems. It is thus helpful for many network operators to recover the missing data from the partial direct measurements. Some existing matrix completion methods do not fully consider network traffic behavior and hidden traffic characteristics, showing the inability to adapt to multiple scenarios. Others instead make assumptions on the matrix structure that may be invalid or impractical, curtailing the applicability. In this paper, we propose Hide & Seek, a novel matrix completion and prediction algorithm based on a combination of generative autoencoders and Hidden Markov Models. We demonstrate with an extensive experimental evaluation on real-world datasets how our algorithm can accurately reconstruct missing values while predicting their short-term evolution.
This paper addresses the control synthesis of heterogeneous stochastic linear multi-agent systems with realtime allocation of signal temporal logic (STL) specifications. Based on previous work, we decompose specificat...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
This paper addresses the control synthesis of heterogeneous stochastic linear multi-agent systems with realtime allocation of signal temporal logic (STL) specifications. Based on previous work, we decompose specifications into subspecifications on the individual agent level. To leverage the efficiency of task allocation, a heuristic filter evaluates potential task allocation based on STL robustness, and subsequently, an auctioning algorithm determines the definitive allocation of specifications. Finally, a control strategy is synthesized for each agent-specification pair using tube-based model predictive control (MPC), ensuring provable probabilistic satisfaction. We demonstrate the efficacy of the proposed methods using a multi-shuttle scenario that highlights a promising extension to automated driving applications like vehicle routing.
Faced with an escalating number of fingerprint images, most existing retrieval approachs suffer from a common problem: diminishing computational efficiency. This paper presents a hierarchical retrieval system tailored...
详细信息
ISBN:
(数字)9798350386226
ISBN:
(纸本)9798350386233
Faced with an escalating number of fingerprint images, most existing retrieval approachs suffer from a common problem: diminishing computational efficiency. This paper presents a hierarchical retrieval system tailored for high-resolution fingerprint images that utilizes abundant pore features and robust recognizability to improve retrieval performance. The framework comprises two core components. Firstly, a CNN-based feature extraction network is established, incorporating an attention mechanism to capture pore features in fingerprint images comprehensively. Subsequently, a hierarchical fingerprint retrieval approach is introduced, involving connection graph construction and a hierarchy of jump table structures for efficient retrieval of query pores. Empirical experiments conducted on high-resolution fingerprint image datasets underscore the system’s effectiveness. Compared with other advanced pore-based fingerprint retrieval methods, the proposed method exhibits a notable rise in the hit rate with reduced penetration rates, significantly reducing the retrieval time.
Liver cancer is one of the dominant causes of cancer death worldwide. Computed Tomography (CT) is the commonly used imaging modality for diagnosing it. computer-based liver cancer diagnosis systems can assist radiolog...
详细信息
Human Activity Recognition (HAR) systems hold great potential in aiding disabled and elderly individuals to live independently. Various approaches have been suggested for identifying human activities, including sensor...
详细信息
暂无评论