-
Network Digital Twin for Route Optimization in 5G/B5G Transport Slicing with What-If Analysis
Authors:
Rebecca Aben-Athar,
Heitor Anglada,
Lucas Costa,
João Albuquerque,
Abrahão Ferreira,
Cristiano Bonato Both,
Kleber Cardoso,
Silvia Lins,
Andrey Silva,
Glauco Gonçalves,
Ilan Correa,
Aldebaro Klautau
Abstract:
The advent of fifth-generation (5G) and Beyond 5G (B5G) networks introduces diverse service requirements, from ultra-low latency to high bandwidth, demanding dynamic monitoring and advanced solutions to ensure Quality of Service (QoS). The transport network - responsible for interconnecting the radio access network and core networks - will increasingly face challenges in efficiently managing compl…
▽ More
The advent of fifth-generation (5G) and Beyond 5G (B5G) networks introduces diverse service requirements, from ultra-low latency to high bandwidth, demanding dynamic monitoring and advanced solutions to ensure Quality of Service (QoS). The transport network - responsible for interconnecting the radio access network and core networks - will increasingly face challenges in efficiently managing complex traffic patterns. The Network Digital Twin (NDT) concept emerges as a promising solution for testing configurations and algorithms in a virtual network before real-world deployment. In this context, this work designs an experimental platform with NDT in a transport network domain, synchronizing with the virtual counterpart and a recommendation system for what-if analysis, enabling intelligent decision-making for dynamic route optimization problems in 5G/B5G scenarios. Our NDT, composed of a Graph Neural Network (GNN), was evaluated across three different network topologies consisting of 8, 16, and 30 nodes. It achieved lower MAPE values for URLLC and eMBB slices, comparing latency predictions with actual latency after the solution implementation. These values indicate high accuracy, demonstrating the solution's effectiveness in generating precise insights into network performance if a particular solution were implemented.
△ Less
Submitted 7 May, 2025;
originally announced May 2025.
-
Exploring the Impact of Rewards on Developers' Proactive AI Accountability Behavior
Authors:
L. H. Nguyen,
S. Lins,
G. Du,
A. Sunyaev
Abstract:
The rapid integration of Artificial Intelligence (AI)-based systems offers benefits for various domains of the economy and society but simultaneously raises concerns due to emerging scandals. These scandals have led to the increasing importance of AI accountability to ensure that actors provide justification and victims receive compensation. However, AI accountability has a negative connotation du…
▽ More
The rapid integration of Artificial Intelligence (AI)-based systems offers benefits for various domains of the economy and society but simultaneously raises concerns due to emerging scandals. These scandals have led to the increasing importance of AI accountability to ensure that actors provide justification and victims receive compensation. However, AI accountability has a negative connotation due to its emphasis on penalizing sanctions, resulting in reactive approaches to emerging concerns. To counteract the prevalent negative view and offer a proactive approach to facilitate the AI accountability behavior of developers, we explore rewards as an alternative mechanism to sanctions. We develop a theoretical model grounded in Self-Determination Theory to uncover the potential impact of rewards and sanctions on AI developers. We further identify typical sanctions and bug bounties as potential reward mechanisms by surveying related research from various domains, including cybersecurity.
△ Less
Submitted 27 November, 2024;
originally announced November 2024.
-
Unraveling the Nuances of AI Accountability: A Synthesis of Dimensions Across Disciplines
Authors:
L. H. Nguyen,
S. Lins,
M. Renner,
A. Sunyaev
Abstract:
The widespread diffusion of Artificial Intelligence (AI)-based systems offers many opportunities to contribute to the well-being of individuals and the advancement of economies and societies. This diffusion is, however, closely accompanied by public scandals causing harm to individuals, markets, or society, and leading to the increasing importance of accountability. AI accountability itself faces…
▽ More
The widespread diffusion of Artificial Intelligence (AI)-based systems offers many opportunities to contribute to the well-being of individuals and the advancement of economies and societies. This diffusion is, however, closely accompanied by public scandals causing harm to individuals, markets, or society, and leading to the increasing importance of accountability. AI accountability itself faces conceptual ambiguity, with research scattered across multiple disciplines. To address these issues, we review current research across multiple disciplines and identify key dimensions of accountability in the context of AI. We reveal six themes with 13 corresponding dimensions and additional accountability facilitators that future research can utilize to specify accountability scenarios in the context of AI-based systems.
△ Less
Submitted 17 October, 2024; v1 submitted 5 October, 2024;
originally announced October 2024.
-
Closed-form congestion control via deep symbolic regression
Authors:
Jean Martins,
Igor Almeida,
Ricardo Souza,
Silvia Lins
Abstract:
As mobile networks embrace the 5G era, the interest in adopting Reinforcement Learning (RL) algorithms to handle challenges in ultra-low-latency and high throughput scenarios increases. Simultaneously, the advent of packetized fronthaul networks imposes demanding requirements that traditional congestion control mechanisms cannot accomplish, highlighting the potential of RL-based congestion control…
▽ More
As mobile networks embrace the 5G era, the interest in adopting Reinforcement Learning (RL) algorithms to handle challenges in ultra-low-latency and high throughput scenarios increases. Simultaneously, the advent of packetized fronthaul networks imposes demanding requirements that traditional congestion control mechanisms cannot accomplish, highlighting the potential of RL-based congestion control algorithms. Although learning RL policies optimized for satisfying the stringent fronthaul requirements is feasible, the adoption of neural network models in real deployments still poses some challenges regarding real-time inference and interpretability. This paper proposes a methodology to deal with such challenges while maintaining the performance and generalization capabilities provided by a baseline RL policy. The method consists of (1) training a congestion control policy specialized in fronthaul-like networks via reinforcement learning, (2) collecting state-action experiences from the baseline, and (3) performing deep symbolic regression on the collected dataset. The proposed process overcomes the challenges related to inference-time limitations through closed-form expressions that approximate the baseline performance (link utilization, delay, and fairness) and which can be directly implemented in any programming language. Finally, we analyze the inner workings of the closed-form expressions.
△ Less
Submitted 28 March, 2024;
originally announced May 2024.
-
Despertando o Interesse de Mulheres para os Cursos em STEM
Authors:
Tainara Silva Novaes,
Kathleen Danielly Souza Lins,
Adolfo Gustavo S. Seca Neto,
Mariangela de Oliveira G. Setti,
Maria Claudia F. Pereira Emer
Abstract:
This article presents initiatives aimed at promoting female participation in STEM fields, with the goal of encouraging more women to pursue careers in these areas. One of these initiatives is the Emílias - Armação em Bits Project, which organizes workshops in schools. Additionally, a podcast has been created to foster interaction between young people and professionals in the field of computing, wh…
▽ More
This article presents initiatives aimed at promoting female participation in STEM fields, with the goal of encouraging more women to pursue careers in these areas. One of these initiatives is the Emílias - Armação em Bits Project, which organizes workshops in schools. Additionally, a podcast has been created to foster interaction between young people and professionals in the field of computing, while also contributing to the establishment of female role models in the industry. The results of these initiatives have been promising, as 70.6% of the students who participated in the workshops expressed an interest in computing. Furthermore, according to Spotify, the podcast's audience consists of 53% females, 44% males, and 3% unspecified, indicating that it has successfully reached a female demographic.
Resumo. Este artigo apresenta iniciativas que têm como objetivo promover a participação das mulheres nas áreas de STEM, buscando encorajar mais mulheres a seguirem carreiras nesses campos. O Projeto Emílias - Armação em Bits desenvolve oficinas nas escolas e também um podcast, promovendo a interação entre jovens e profissionais da área de computação, além de contribuir para a formação de modelos femininos nesse campo. Os resultados demonstraram que 70,6% das estudantes demonstraram interesse pela computação após participarem das oficinas. Em relação aos ouvintes do podcast, dados do Spotify indicaram que 53% do público se identifica como feminino, 44% como masculino, e 3% não especificaram o gênero, o que mostra que o podcast tem alcançado um público feminino.
△ Less
Submitted 29 May, 2023;
originally announced May 2023.
-
Gamification of Enterprise Systems: A Synthesis of Mechanics, Dynamics, and Risks
Authors:
M. Schmidt-Kraepelin,
S. Lins,
S. Thiebes,
A. Sunyaev
Abstract:
Organizations highly depend on enterprise systems (ES), which are unlikely to develop their full potential if end-users neglect system usage. Accordingly, organizations attempt to overcome barriers to end-user acceptance in the ES context, which can be attributed to several factors on ES, organizational, and end-user level. Trying to take advantage of the growing passion for games, Gamification is…
▽ More
Organizations highly depend on enterprise systems (ES), which are unlikely to develop their full potential if end-users neglect system usage. Accordingly, organizations attempt to overcome barriers to end-user acceptance in the ES context, which can be attributed to several factors on ES, organizational, and end-user level. Trying to take advantage of the growing passion for games, Gamification is a phenomenon proposed to motivate people by applying elements common to games in other contexts that have the potential to increase end-user acceptance. While first applications of Gamification exist in areas such as finance, health, and education, utility of gamifying ES has not been explored in-depth. Aiming to understand how Gamification can be applied to ES to increase user motivation, we analyze literature concerning game elements (i.e., mechanics and dynamics) used in Gamification and related risks. Our study yields a synthesis of mechanics in clusters of system design, challenges, rewards, and user specifics as well as related dynamics. We discuss the extent to which the game elements can be used to address ES acceptance barriers. While our study reveals that Gamification has potential for motivating ES users, future research should analyze concrete implementations of Gamification in ES contexts to investigate long-term effects.
△ Less
Submitted 4 June, 2019;
originally announced June 2019.
-
Mind the Gap: Trade-Offs between Distributed Ledger Technology Characteristics
Authors:
Niclas Kannengießer,
Sebastian Lins,
Tobias Dehling,
Ali Sunyaev
Abstract:
When developing peer-to-peer applications on Distributed Ledger Technology (DLT), a crucial decision is the selection of a suitable DLT design (e.g., Ethereum) because it is hard to change the underlying DLT design post hoc. To facilitate the selection of suitable DLT designs, we review DLT characteristics and identify trade-offs between them. Furthermore, we assess how DLT designs account for the…
▽ More
When developing peer-to-peer applications on Distributed Ledger Technology (DLT), a crucial decision is the selection of a suitable DLT design (e.g., Ethereum) because it is hard to change the underlying DLT design post hoc. To facilitate the selection of suitable DLT designs, we review DLT characteristics and identify trade-offs between them. Furthermore, we assess how DLT designs account for these trade-offs and we develop archetypes for DLT designs that cater to specific quality requirements. The main purpose of our article is to introduce scientific and practical audiences to the intricacies of DLT designs and to support development of viable applications on DLT.
△ Less
Submitted 4 February, 2020; v1 submitted 3 June, 2019;
originally announced June 2019.
-
An O(|E|)-linear Model for the MaxCut Problem
Authors:
Sostenes L. Lins,
Diogo B. Henriques
Abstract:
A polytope $P$ is a {\em model} for a combinatorial problem on finite graphs $G$ whose variables are indexed by the edge set $E$ of $G$ if the points of $P$ with (0,1)-coordinates are precisely the characteristic vectors of the subset of edges inducing the feasible configurations for the problem. In the case of the (simple) MaxCut Problem, which is the one that concern us here, the feasible subset…
▽ More
A polytope $P$ is a {\em model} for a combinatorial problem on finite graphs $G$ whose variables are indexed by the edge set $E$ of $G$ if the points of $P$ with (0,1)-coordinates are precisely the characteristic vectors of the subset of edges inducing the feasible configurations for the problem. In the case of the (simple) MaxCut Problem, which is the one that concern us here, the feasible subsets of edges are the ones inducing the bipartite subgraphs of $G$. In this paper we introduce a new polytope $\mathbb{P}_{12} \subset \mathbb{R}^{|E|}$ given by at most $11|E|$ inequalities, which is a model for the MaxCut Problem on $G$. Moreover, the left side of each inequality is the sum of at most 4 edge variables with coefficients $\pm1$ and right side 0,1, or 2. We restrict our analysis to the case of $G=K_{z}$, the complete graph in $z$ vertices, where $z$ is an even positive integer $z\ge 4$. This case is sufficient to study because the simple MaxCut problem for general graphs $G$ can be reduced to the complete graph $K_z$ by considering the obective function of the associated integer programming as the characteristic vector of the edges in $G \subseteq K_z$. This is a polynomial algorithmic transformation.
△ Less
Submitted 8 April, 2016;
originally announced April 2016.
-
PHORMA: Perfectly Hashed Order Restricted Multidimensional Array
Authors:
Lauro Lins,
Sostenes Lins,
Silvio Melo
Abstract:
In this paper we propose a simple and efficient strategy to obtain a data structure generator to accomplish a perfect hash of quite general order restricted multidimensional arrays named {\em phormas}. The constructor of such objects gets two parameters as input: an n-vector a of non negative integers and a boolean function B on the types of order restrictions on the coordinates of the valid n-v…
▽ More
In this paper we propose a simple and efficient strategy to obtain a data structure generator to accomplish a perfect hash of quite general order restricted multidimensional arrays named {\em phormas}. The constructor of such objects gets two parameters as input: an n-vector a of non negative integers and a boolean function B on the types of order restrictions on the coordinates of the valid n-vectors bounded by a. At compiler time, the phorma constructor builds, from the pair a,B, a digraph G(a,B) with a single source s and a single sink t such that the st-paths are in 1-1 correspondence with the members of the B-restricted a-bounded array A(a,B). Besides perfectly hashing A(a,B), G(a,B) is an instance of an NW-family. This permits other useful computational tasks on it.
△ Less
Submitted 24 January, 2003;
originally announced January 2003.
-
PHORMA: Perfectly Hashable Order Restricted Multidimensional Arrays
Authors:
Lauro Lins,
Sostenes Lins,
Silvio Melo
Abstract:
In this paper we propose a simple and efficient data structure yielding a perfect hashing of quite general arrays. The data structure is named phorma, which is an acronym for perfectly hashable order restricted multidimensional array.
Keywords: Perfect hash function, Digraph, Implicit enumeration, Nijenhuis-Wilf combinatorial family.
In this paper we propose a simple and efficient data structure yielding a perfect hashing of quite general arrays. The data structure is named phorma, which is an acronym for perfectly hashable order restricted multidimensional array.
Keywords: Perfect hash function, Digraph, Implicit enumeration, Nijenhuis-Wilf combinatorial family.
△ Less
Submitted 23 March, 2003; v1 submitted 21 January, 2003;
originally announced January 2003.