-
Federated Learning with Server Learning: Enhancing Performance for Non-IID Data
Authors:
Van Sy Mai,
Richard J. La,
Tao Zhang
Abstract:
Federated Learning (FL) has emerged as a means of distributed learning using local data stored at clients with a coordinating server. Recent studies showed that FL can suffer from poor performance and slower convergence when training data at clients are not independent and identically distributed. Here we consider a new complementary approach to mitigating this performance degradation by allowing…
▽ More
Federated Learning (FL) has emerged as a means of distributed learning using local data stored at clients with a coordinating server. Recent studies showed that FL can suffer from poor performance and slower convergence when training data at clients are not independent and identically distributed. Here we consider a new complementary approach to mitigating this performance degradation by allowing the server to perform auxiliary learning from a small dataset. Our analysis and experiments show that this new approach can achieve significant improvements in both model accuracy and convergence time even when the server dataset is small and its distribution differs from that of the aggregated data from all clients.
△ Less
Submitted 15 August, 2023; v1 submitted 5 October, 2022;
originally announced October 2022.
-
Miniature Robot Path Planning for Bridge Inspection: Min-Max Cycle Cover-Based Approach
Authors:
Michael Lin,
Richard J. La
Abstract:
We study the problem of planning the deployments of a group of mobile robots. While the problem and formulation can be used for many different problems, here we use a bridge inspection as the motivating application for the purpose of exposition. The robots are initially stationed at a set of depots placed throughout the bridge. Each robot is then assigned a set of sites on the bridge to inspect an…
▽ More
We study the problem of planning the deployments of a group of mobile robots. While the problem and formulation can be used for many different problems, here we use a bridge inspection as the motivating application for the purpose of exposition. The robots are initially stationed at a set of depots placed throughout the bridge. Each robot is then assigned a set of sites on the bridge to inspect and, upon completion, must return to the same depot where it is stored.
The problem of robot planning is formulated as a rooted min-max cycle cover problem, in which the vertex set consists of the sites to be inspected and robot depots, and the weight of an edge captures either (i) the amount of time needed to travel from one end vertex to the other vertex or (ii) the necessary energy expenditure for the travel. In the first case, the objective function is the total inspection time, whereas in the latter case, it is the maximum energy expenditure among all deployed robots. We propose a novel algorithm with approximation ratio of $5 + ε$, where $0<ε<1$. In addition, the computational complexity of the proposed algorithm is shown to be $O\big( n^2+2^{m-1} n \log(n+k) \big)$, where $n$ is the number of vertices, and $m$ is the number of depots.
△ Less
Submitted 6 March, 2020;
originally announced March 2020.
-
Channels, Remote Estimation and Queueing Systems With A Utilization-Dependent Component: A Unifying Survey Of Recent Results
Authors:
Varun Jog,
Richard J. La,
Michael Lin,
Nuno C. Martins
Abstract:
In this article, we survey the main models, techniques, concepts, and results centered on the design and performance evaluation of engineered systems that rely on a utilization-dependent component (UDC) whose operation may depend on its usage history or assigned workload. Specifically, we report on research themes concentrating on the characterization of the capacity of channels and the design wit…
▽ More
In this article, we survey the main models, techniques, concepts, and results centered on the design and performance evaluation of engineered systems that rely on a utilization-dependent component (UDC) whose operation may depend on its usage history or assigned workload. Specifically, we report on research themes concentrating on the characterization of the capacity of channels and the design with performance guarantees of remote estimation and queueing systems. Causes for the dependency of a UDC on past utilization include the use of replenishable energy sources to power the transmission of information among the sub-components of a networked system, and the assistance of a human operator for servicing a queue. Our analysis unveils the similarity of the UDC models typically adopted in each of the research themes, and it reveals the differences in the objectives and technical approaches employed. We also identify new challenges and future research directions inspired by the cross-pollination among the central concepts, techniques, and problem formulations of the research themes discussed.
△ Less
Submitted 11 January, 2021; v1 submitted 10 May, 2019;
originally announced May 2019.
-
Effects of Degree Correlations in Interdependent Security: Good or Bad?
Authors:
Richard J. La
Abstract:
We study the influence of degree correlations or network mixing in interdependent security. We model the interdependence in security among agents using a dependence graph and employ a population game model to capture the interaction among many agents when they are strategic and have various security measures they can choose to defend themselves. The overall network security is measured by what we…
▽ More
We study the influence of degree correlations or network mixing in interdependent security. We model the interdependence in security among agents using a dependence graph and employ a population game model to capture the interaction among many agents when they are strategic and have various security measures they can choose to defend themselves. The overall network security is measured by what we call the average risk exposure (ARE) from neighbors, which is proportional to the total (expected) number of attacks in the network.
We first show that there exists a unique pure-strategy Nash equilibrium of a population game. Then, we prove that as the agents with larger degrees in the dependence graph see higher risks than those with smaller degrees, the overall network security deteriorates in that the ARE experienced by agents increases and there are more attacks in the network. Finally, using this finding, we demonstrate that the effects of network mixing on ARE depend on the (cost) effectiveness of security measures available to agents; if the security measures are not effective, increasing assortativity of dependence graph results in higher ARE. On the other hand, if the security measures are effective at fending off the damages and losses from attacks, increasing assortativity reduces the ARE experienced by agents.
△ Less
Submitted 3 April, 2017;
originally announced April 2017.
-
Internalization of Externalities in Interdependent Security: Large Network Cases
Authors:
Richard J. La
Abstract:
With increasing connectivity among comprising agents or (sub-)systems in large, complex systems, there is a growing interest in understanding interdependent security and dealing with inefficiency in security investments. Making use of a population game model and the well-known Chung-Lu random graph model, we study how one could encourage selfish agents to invest more in security by internalizing t…
▽ More
With increasing connectivity among comprising agents or (sub-)systems in large, complex systems, there is a growing interest in understanding interdependent security and dealing with inefficiency in security investments. Making use of a population game model and the well-known Chung-Lu random graph model, we study how one could encourage selfish agents to invest more in security by internalizing the externalities produced by their security investments.
To this end, we first establish an interesting relation between the local minimizers of social cost and the Nash equilibria of a population game with slightly altered costs. Secondly, under a mild technical assumption, we demonstrate that there exists a unique minimizer of social cost and it coincides with the unique Nash equilibrium of the population game. This finding tells us how to modify the private cost functions of selfish agents in order to enhance the overall security and reduce social cost. In addition, it reveals how the sensitivity of overall security to security investments of agents influences their externalities and, consequently, penalties or taxes that should be imposed for internalization of externalities. Finally, we illustrate how the degree distribution of agents influences their security investments and overall security at both the NEs of population games and social optima.
△ Less
Submitted 3 March, 2017;
originally announced March 2017.
-
Cascading Failures in Interdependent Systems: Impact of Degree Variability and Dependence
Authors:
Richard J. La
Abstract:
We study cascading failures in a system comprising interdependent networks/systems, in which nodes rely on other nodes both in the same system and in other systems to perform their function. The (inter-)dependence among nodes is modeled using a dependence graph, where the degree vector of a node determines the number of other nodes it can potentially cause to fail in each system through aforementi…
▽ More
We study cascading failures in a system comprising interdependent networks/systems, in which nodes rely on other nodes both in the same system and in other systems to perform their function. The (inter-)dependence among nodes is modeled using a dependence graph, where the degree vector of a node determines the number of other nodes it can potentially cause to fail in each system through aforementioned dependency. In particular, we examine the impact of the variability and dependence properties of node degrees on the probability of cascading failures. We show that larger variability in node degrees hampers widespread failures in the system, starting with random failures. Similarly, positive correlations in node degrees make it harder to set off an epidemic of failures, thereby rendering the system more robust against random failures.
△ Less
Submitted 10 February, 2018; v1 submitted 1 February, 2017;
originally announced February 2017.
-
Interdependent Security with Strategic Agents and Cascades of Infection
Authors:
Richard J. La
Abstract:
We investigate cascades in networks consisting of strategic agents with interdependent security. We assume that the strategic agents have choices between i) investing in protecting themselves, ii) purchasing insurance to transfer (some) risks, and iii) taking no actions. Using a population game model, we study how various system parameters, such as node degrees, infection propagation rate, and the…
▽ More
We investigate cascades in networks consisting of strategic agents with interdependent security. We assume that the strategic agents have choices between i) investing in protecting themselves, ii) purchasing insurance to transfer (some) risks, and iii) taking no actions. Using a population game model, we study how various system parameters, such as node degrees, infection propagation rate, and the probability with which infected nodes transmit infection to neighbors, affect nodes' choices at Nash equilibria and the resultant price of anarchy/stability. In addition, we examine how the probability that a single infected node can spread the infection to a significant portion of the entire network, called cascade probability, behaves with respect to system parameters. In particular, we demonstrate that, at least for some parameter regimes, the cascade probability increases with the average degree of nodes.
△ Less
Submitted 25 February, 2015;
originally announced February 2015.
-
Fast Adaptive S-ALOHA Scheme for Event-driven M2M Communications (Journal version)
Authors:
Huasen Wu,
Chenxi Zhu,
Richard J. La,
Xin Liu,
Youguang Zhang
Abstract:
Supporting massive device transmission is challenging in Machine-to-Machine (M2M) communications. Particularly, in event-driven M2M communications, a large number of devices activate within a short period of time, which in turn causes high radio congestions and severe access delay. To address this issue, we propose a Fast Adaptive S-ALOHA (FASA) scheme for random access control of M2M communicatio…
▽ More
Supporting massive device transmission is challenging in Machine-to-Machine (M2M) communications. Particularly, in event-driven M2M communications, a large number of devices activate within a short period of time, which in turn causes high radio congestions and severe access delay. To address this issue, we propose a Fast Adaptive S-ALOHA (FASA) scheme for random access control of M2M communication systems with bursty traffic. Instead of the observation in a single slot, the statistics of consecutive idle and collision slots are used in FASA to accelerate the tracking process of network status which is critical for optimizing S-ALOHA systems. Using drift analysis, we design the FASA scheme such that the estimate of the backlogged devices converges fast to the true value. Furthermore, by examining the $T$-slot drifts, we prove that the proposed FASA scheme is stable as long as the average arrival rate is smaller than $e^{-1}$, in the sense that the Markov Chain derived from the scheme is geometrically ergodic. Simulation results demonstrate that the proposed FASA scheme outperforms traditional additive schemes such as PB-ALOHA and achieves near-optimal performance in reducing access delay. Moreover, compared to multiplicative schemes, FASA shows its robustness under heavy traffic load in addition to better delay performance.
△ Less
Submitted 15 August, 2012;
originally announced August 2012.
-
Fast Adaptive S-ALOHA Scheme for Event-driven Machine-to-Machine Communications
Authors:
Huasen Wu,
Chenxi Zhu,
Richard J. La,
Xin Liu,
Youguang Zhang
Abstract:
Machine-to-Machine (M2M) communication is now playing a market-changing role in a wide range of business world. However, in event-driven M2M communications, a large number of devices activate within a short period of time, which in turn causes high radio congestions and severe access delay. To address this issue, we propose a Fast Adaptive S-ALOHA (FASA) scheme for M2M communication systems with b…
▽ More
Machine-to-Machine (M2M) communication is now playing a market-changing role in a wide range of business world. However, in event-driven M2M communications, a large number of devices activate within a short period of time, which in turn causes high radio congestions and severe access delay. To address this issue, we propose a Fast Adaptive S-ALOHA (FASA) scheme for M2M communication systems with bursty traffic. The statistics of consecutive idle and collision slots, rather than the observation in a single slot, are used in FASA to accelerate the tracking process of network status. Furthermore, the fast convergence property of FASA is guaranteed by using drift analysis. Simulation results demonstrate that the proposed FASA scheme achieves near-optimal performance in reducing access delay, which outperforms that of traditional additive schemes such as PB-ALOHA. Moreover, compared to multiplicative schemes, FASA shows its robustness even under heavy traffic load in addition to better delay performance.
△ Less
Submitted 29 April, 2012; v1 submitted 14 February, 2012;
originally announced February 2012.