Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Bayesian Optimization for Online Management in Dynamic Mobile Edge Computing

Published: 29 August 2023 Publication History

Abstract

Recent years have witnessed the emergence of mobile edge computing (MEC), on the premise of a cost-effective enhancement in the computational ability of hardware-constrained wireless devices (WDs) comprising the Internet of Things (IoT). In a general multi-server multi-user MEC system, each WD has a computational task to execute and has to select binary (off)loading decisions, along with the analog-amplitude resource allocation variables in an online manner, with the goal of minimizing the overall energy-delay cost (EDC) with dynamic system states. While past works typically rely on the explicit expression of the EDC function, the present contribution considers a practical setting, where in lieu of system state information, the EDC function is not available in analytical form, and instead only the function values at queried points are revealed. Towards tackling such a challenging online combinatorial problem with only bandit information, novel Bayesian optimization (BO) based approaches are put forth by leveraging the multi-armed bandit (MAB) framework. Per time slot, the discrete offloading decisions are first obtained via the MAB method, and the analog resource allocation variables are subsequently optimized using the BO selection rule. By exploiting both temporal and contextual information, two novel BO approaches, termed time-varying BO and contextual time-varying BO, are developed. Numerical tests validate the merits of the proposed BO approaches compared with contemporary benchmarks under different MEC network sizes.

References

[1]
J. Yan, Q. Lu, and G. B. Giannakis, “Bayesian optimization for task offloading and resource allocation in mobile edge computing,” in Proc. 56th Asilomar Conf. Signals, Syst., Comput., Oct. 2022, pp. 1086–1090.
[2]
Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge computing: The communication perspective,” IEEE Commun. Surveys Tuts., vol. 19, no. 4, pp. 2322–2358, 4th Quart., 2017.
[3]
C. You, K. Huang, and H. Chae, “Energy efficient mobile cloud computing powered by wireless energy transfer,” IEEE J. Sel. Areas Commun., vol. 34, no. 5, pp. 1757–1771, May 2016.
[4]
C. You, K. Huang, H. Chae, and B.-H. Kim, “Energy-efficient resource allocation for mobile-edge computation offloading,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1397–1411, Mar. 2017.
[5]
Y. Wang, M. Sheng, X. Wang, L. Wang, and J. Li, “Mobile-edge computing: Partial computation offloading using dynamic voltage scaling,” IEEE Trans. Commun., vol. 64, no. 10, pp. 4268–4282, Oct. 2016.
[6]
T. Q. Dinh, J. Tang, Q. D. La, and T. Q. S. Quek, “Offloading in mobile edge computing: Task allocation and computational frequency scaling,” IEEE Trans. Commun., vol. 65, no. 8, pp. 3571–3584, Aug. 2017.
[7]
S. Bi and Y. J. Zhang, “Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading,” IEEE Trans. Wireless Commun., vol. 17, no. 6, pp. 4177–4190, Jun. 2018.
[8]
J. Yan, S. Bi, Y. J. Zhang, and M. Tao, “Optimal task offloading and resource allocation in mobile-edge computing with inter-user task dependency,” IEEE Trans. Wireless Commun., vol. 19, no. 1, pp. 235–250, Jan. 2020.
[9]
Y. Mao, J. Zhang, and K. B. Letaief, “Dynamic computation offloading for mobile-edge computing with energy harvesting devices,” IEEE J. Sel. Areas Commun., vol. 34, no. 12, pp. 3590–3605, Dec. 2016.
[10]
Y. Mao, J. Zhang, S. H. Song, and K. B. Letaief, “Stochastic joint radio and computational resource management for multi-user mobile-edge computing systems,” IEEE Trans. Wireless Commun., vol. 16, no. 9, pp. 5994–6009, Sep. 2017.
[11]
Z. Yang, S. Bi, and Y. A. Zhang, “Dynamic offloading and trajectory control for UAV-enabled mobile edge computing system with energy harvesting devices,” IEEE Trans. Wireless Commun., vol. 21, no. 12, pp. 10515–10528, Dec. 2022.
[12]
T. Chen, Q. Ling, Y. Shen, and G. B. Giannakis, “Heterogeneous online learning for ‘thing-adaptive’ fog computing in IoT,” IEEE Internet Things J., vol. 5, no. 6, pp. 4328–4341, Dec. 2018.
[13]
T. Chen, Q. Ling, and G. B. Giannakis, “An online convex optimization approach to proactive network resource allocation,” IEEE Trans. Signal Process., vol. 65, no. 24, pp. 6350–6364, Dec. 2017.
[14]
E. C. Hall and R. M. Willett, “Online convex optimization in dynamic environments,” IEEE J. Sel. Topics Signal Process., vol. 9, no. 4, pp. 647–662, Jun. 2015.
[15]
A. D. Flaxman, A. T. Kalai, and H. B. McMahan, “Online convex optimization in the bandit setting: Gradient descent without a gradient,” in Proc. ACM SODA, Vancouver, BC, Canada, Jan. 2005, pp. 385–394.
[16]
Y. Ding and J. Lavaei, “Structured projection-free online convex optimization with multi-point bandit feedback,” in Proc. 60th IEEE Conf. Decis. Control (CDC), Dec. 2021, pp. 28–40.
[17]
O. Shamir, “An optimal algorithm for bandit and zero-order convex optimization with two-point feedback,” J. Mach. Learn. Res., vol. 18, no. 1, pp. 1703–1713, Jan. 2017.
[18]
T. Chen and G. B. Giannakis, “Bandit convex optimization for scalable and dynamic IoT management,” IEEE Internet Things J., vol. 6, no. 1, pp. 1276–1286, Feb. 2019.
[19]
B. Wu, T. Chen, W. Ni, and X. Wang, “Multi-agent multi-armed bandit learning for online management of edge-assisted computing,” IEEE Trans. Commun., vol. 69, no. 12, pp. 8188–8199, Dec. 2021.
[20]
B. Li, T. Chen, and G. B. Giannakis, “Secure mobile edge computing in IoT via collaborative online learning,” IEEE Trans. Signal Process., vol. 67, no. 23, pp. 5922–5935, Dec. 2019.
[21]
Y. Sunet al., “Adaptive learning-based task offloading for vehicular edge computing systems,” IEEE Trans. Veh. Technol., vol. 68, no. 4, pp. 3061–3074, Apr. 2019.
[22]
Y. Sun, S. Zhou, and J. Xu, “EMM: Energy-aware mobility management for mobile edge computing in ultra dense networks,” IEEE J. Sel. Areas Commun., vol. 35, no. 11, pp. 2637–2646, Nov. 2017.
[23]
P. I. Frazier, “A tutorial on Bayesian optimization,” 2018, arXiv:1807.02811.
[24]
Q. Lu, K. D. Polyzos, B. Li, and G. B. Giannakis, “Surrogate modeling for Bayesian optimization beyond a single Gaussian process,” 2022, arXiv:2205.14090.
[25]
C. E. Rasmussen and C. K. Williams, Gaussian Processes for Machine Learning. Cambridge, MA, USA: MIT Press, 2006.
[26]
Q. Lu, G. Karanikolas, Y. Shen, and G. B. Giannakis, “Ensemble Gaussian processes with spectral features for online interactive learning with scalability,” in Proc. Int. Conf. Artif. Intell. Statist., Jun. 2020, pp. 1910–1920.
[27]
Q. Lu, G. V. Karanikolas, and G. B. Giannakis, “Incremental ensemble Gaussian processes,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 45, no. 2, pp. 1876–1893, Feb. 2023.
[28]
K. D. Polyzos, Q. Lu, and G. B. Giannakis, “Ensemble Gaussian processes for online learning over graphs with adaptivity and scalability,” IEEE Trans. Signal Process., vol. 70, pp. 17–30, 2022.
[29]
J. Snoek, H. Larochelle, and R. P. Adams, “Practical Bayesian optimization of machine learning algorithms,” in Proc. Adv. Neural Inf. Process. Syst., vol. 25, Dec. 2012, pp. 1–9.
[30]
K. Korovinaet al., “ChemBO: Bayesian optimization of small organic molecules with synthesizable recommendations,” in Proc. Int. Conf. Artif. Intell. Statist., Jun. 2020, pp. 3393–3403.
[31]
A. Cully, J. Clune, D. Tarapore, and J.-B. Mouret, “Robots that can adapt like animals,” Nature, vol. 521, no. 7553, pp. 503–507, May 2015.
[32]
L. Maggi, A. Valcarce, and J. Hoydis, “Bayesian optimization for radio resource management: Open loop power control,” IEEE J. Sel. Areas Commun., vol. 39, no. 7, pp. 1858–1871, Jul. 2021.
[33]
R. M. Dreifuerstet al., “Optimizing coverage and capacity in cellular networks using machine learning,” in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), Jun. 2021, pp. 8138–8142.
[34]
S. Yang, B. Liu, Z. Hong, and Z. Zhang, “Bayesian optimization-based beam alignment for mmWave MIMO communication systems,” 2022, arXiv:2207.14174.
[35]
H. Liu and G. Cao, “Deep learning video analytics through online learning based edge computing,” IEEE Trans. Wireless Commun., vol. 21, no. 10, pp. 8193–8204, Oct. 2022.
[36]
B. Ru, A. S. Alvi, V. Nguyen, M. A. Osborne, and S. J. Roberts, “Bayesian optimisation over multiple continuous and categorical inputs,” in Proc. Int. Conf. Mach. Learn., Apr. 2020, pp. 8276–8285.
[37]
I. Bogunovic, J. Scarlett, and V. Cevher, “Time-varying Gaussian process bandit optimization,” in Proc. Int. Conf. Artif. Intell. Statist., May 2016, pp. 314–323.
[38]
P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire, “The nonstochastic multiarmed bandit problem,” SIAM J. Comput., vol. 32, no. 1, pp. 48–77, Jan. 2002.
[39]
N. Srinivas, A. Krause, S. M. Kakade, and M. W. Seeger, “Information-theoretic regret bounds for Gaussian process optimization in the bandit setting,” IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3250–3265, May 2012.
[40]
V. Mnihet al., “Human-level control through deep reinforcement learning,” Nature, vol. 518, pp. 529–533, Feb. 2015.
[41]
M. Titsias, “Variational learning of inducing variables in sparse Gaussian processes,” in Proc. Int. Conf. Artif. Intell. Statist., Apr. 2009, pp. 567–574.
[42]
M. Lázaro-Gredilla, J. Quiñonero-Candela, C. E. Rasmussen, and A. R. Figueiras-Vidal, “Sparse spectrum Gaussian process regression,” J. Mach. Learn. Research, vol. 11, no. 1, pp. 1865–1881, Aug. 2010.
[43]
A. Krause and C. Ong, “Contextual Gaussian process bandit optimization,” in Proc. Adv. Neural Inf. Process. Syst., vol. 24, Dec. 2011, pp. 1–9.
[44]
A. P. Miettinen and J. K. Nurminen, “Energy efficiency of mobile clients in cloud computing,” in Proc. 2nd USENIX Workshop Hot Topics Cloud Comput., Jun. 2010, pp. 1–7.
[45]
P. Laiet al., “Optimal edge user allocation in edge computing with variable sized vector bin packing,” in Proc. Int. Conf. Service-Oriented Comput. Hangzhou, China: Springer, 2018, pp. 230–245.
[46]
G. Cuiet al., “OL-EUA: Online user allocation for NOMA-based mobile edge computing,” IEEE Trans. Mobile Comput., vol. 22, no. 4, pp. 2295–2306, Apr. 2023.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Wireless Communications
IEEE Transactions on Wireless Communications  Volume 23, Issue 4
April 2024
1396 pages

Publisher

IEEE Press

Publication History

Published: 29 August 2023

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Oct 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media