Multi-user Edge-assisted Video Analytics Task Offloading Game based on Deep Reinforcement Learning

被引:17
作者
Chen, Yu [1 ]
Zhang, Sheng [1 ]
Xiao, Mingjun [2 ]
Qian, Zhuzhong [1 ]
Wu, Jie [3 ]
Lu, Sanglu [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Peoples R China
[2] Univ Sci & Technol China, Sch Comp Sci & Technol, Suzhou Inst Adv Study, Hefei, Peoples R China
[3] Temple Univ, Ctr Networked Comp, Philadelphia, PA 19122 USA
来源
2020 IEEE 26TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS) | 2020年
基金
国家重点研发计划;
关键词
edge computing; video analytics; task offloading; decentralized algorithm; game theory; Markov decision process; deep reinforcement learning; MANAGEMENT; NETWORKS;
D O I
10.1109/ICPADS51040.2020.00044
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of deep learning, artificial intelligence applications and services have boomed in the recent years, including recommendation systems, personal assistant and video analytics. Similar to other services in the edge computing environment, artificial intelligence computing tasks are pushed to the network edge. In this paper, we consider the multi-user edge-assisted video analytics task offloading (MEVAO) problem, where users have video analytics tasks with various accuracy requirements. All users independently choose their accuracy decisions, satisfying the accuracy requirement, and offload the video data to the edge server. With the utility function designed based on the features of video analytics, we model MEVAO as a game theory problem and achieve the Nash equilibrium, For the flexibility of making accuracy decisions under different circumstances, a deep reinforcement learning approach is applied to our problem. Our proposed design has much better performance compared with some other approaches in the extensive simulations.
引用
收藏
页码:266 / 273
页数:8
相关论文
共 29 条
[1]   Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey [J].
Abdalzaher, Mohamed S. ;
Seddik, Karim ;
Elsabrouty, Maha ;
Muta, Osamu ;
Furukawa, Hiroshi ;
Abdel-Rahman, Adel .
SENSORS, 2016, 16 (07)
[2]   Video Stream Analysis in Clouds: An Object Detection and Classification Framework for High Performance Video Analytics [J].
Anjum, Ashiq ;
Abdullah, Tariq ;
Tariq, M. Fahim ;
Baltaci, Yusuf ;
Antonopoulos, Nick .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (04) :1152-1167
[3]  
Bansal T., 2017, ARXIV PREPRINT ARXIV
[4]   Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues [J].
Caprolu, Maurantonio ;
Di Pietro, Roberto ;
Lombardi, Flavio ;
Raponi, Simone .
2019 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2019, :116-123
[5]   Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing [J].
Chen, Xu ;
Jiao, Lei ;
Li, Wenzhong ;
Fu, Xiaoming .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) :2827-2840
[6]  
Dutta Prajit K, 1999, Strategies and games: theory and practice
[7]  
Gibbons R., 1992, A Primer in Game Theory
[8]  
Hsieh K, 2018, PROCEEDINGS OF THE 13TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P269
[9]   Heterogeneous Edge Offloading With Incomplete Information: A Minority Game Approach [J].
Hu, Miao ;
Xie, Zixuan ;
Wu, Di ;
Zhou, Yipeng ;
Chen, Xu ;
Xiao, Liang .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 31 (09) :2139-2154
[10]   Fog Computing May Help to Save Energy in Cloud Computing [J].
Jalali, Fatemeh ;
Hinton, Kerry ;
Ayre, Robert ;
Alpcan, Tansu ;
Tucker, Rodney S. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (05) :1728-1739