51蹤獲

Function Load Balancing Over Networks

Submitted by admin on Mon, 10/28/2024 - 01:24

Using networks as a means of computing can reduce the communication flow over networks. We propose to distribute the computation load in stationary networks and formulate a flow-based delay minimization problem that jointly captures the costs of communications and computation. We exploit the distributed compression scheme of Slepian-Wolf that is applicable under any protocol information. We introduce the notion of entropic surjectivity as a measure of functions sparsity and to understand the limits of functional compression for computation.

Approximate Gradient Coding With Optimal Decoding

Submitted by admin on Mon, 10/28/2024 - 01:24

Gradient codes use data replication to mitigate the effect of straggling machines in distributed machine learning. Approximate gradient codes consider codes where the data replication factor is too low to recover the full gradient exactly. Our work is motivated by the challenge of designing approximate gradient codes that simultaneously work well in both the adversarial and random straggler models. We introduce novel approximate gradient codes based on expander graphs.

Editorial

Submitted by admin on Mon, 10/28/2024 - 01:24

Welcome to the fifth issue of the Journal on Selected Areas In Information Theory (JSAIT), dedicated to Sequential, active, and reinforcement learning.

Optimal Communication-Computation Trade-Off in Heterogeneous Gradient Coding

Submitted by admin on Mon, 10/28/2024 - 01:24

Gradient coding allows a master node to derive the aggregate of the partial gradients, calculated by some worker nodes over the local data sets, with minimum communication cost, and in the presence of stragglers. In this paper, for gradient coding with linear encoding, we characterize the optimum communication cost for heterogeneous distributed systems with arbitrary data placement, with $s \in \mathbb {N}$ stragglers and $a \in \mathbb {N}$ adversarial nodes.

Best-Arm Identification in Correlated Multi-Armed Bandits

Submitted by admin on Mon, 10/28/2024 - 01:24

In this paper we consider the problem of best-arm identification in multi-armed bandits in the fixed confidence setting, where the goal is to identify, with probability $1-\delta $ for some $\delta >0$ , the arm with the highest mean reward in minimum possible samples from the set of arms $\mathcal {K}$ . Most existing best-arm identification algorithms and analyses operate under the assumption that the rewards corresponding to different arms are independent of each other.

On Finite-Time Convergence of Actor-Critic Algorithm

Submitted by admin on Mon, 10/28/2024 - 01:24

Actor-critic algorithm and their extensions have made great achievements in real-world decision-making problems. In contrast to its empirical success, the theoretical understanding of the actor-critic seems unsatisfactory. Most existing results only show the asymptotic convergence, which is developed mainly based on approximating the dynamic system of the actor and critic using ordinary differential equations. However, the finite-time convergence analysis of the actor-critic algorithm remains to be explored.