Learning While Offloading: Task Offloading in Vehicular Edge Computing Network

In vehicular edge computing (VEC) systems, vehicles can contribute their computing resources to the network, and help other vehicles or pedestrians to process their computation tasks. However, the high mobility of vehicles leads to a dynamic and uncertain vehicular environment, where the network topologies, channel states and computing workloads vary fast across time. Therefore, it is challenging to design task offloading algorithms to optimize the delay performance of tasks. In this chapter, we consider the task offloading among vehicles, and design learning-based task offloading algorithms based on the multi-armed bandit (MAB) theory, which enable vehicles to learn the delay performance of their surrounding vehicles while offloading tasks. We start from the single offloading case where each task is offloaded to one vehicle to be processed, and propose an adaptive learning-based task offloading (ALTO) algorithm, by jointly considering the variations of surrounding vehicles and the input data size. To further improve the reliability of the computing services, we introduce the task replication technique, where the replicas of each task is offloaded to multiple vehicles and processed by them simultaneously, and propose a learning-based task replication algorithm (LTRA) based on combinatorial MAB. We prove that the proposed ALTO and LTRA algorithms have bounded learning regret, compared with the genie-aided optimal solution. And we also build a system level simulation platform to evaluate the proposed algorithms in the realistic vehicular environment.

[1]  Erik Steinmetz,et al.  Vehicle-to-Vehicle Communications with Urban Intersection Path Loss Models , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[2]  Sudipto Guha,et al.  How to probe for an extreme value , 2010, TALG.

[3]  Xin Liu,et al.  Learning-Based Task Offloading for Vehicular Cloud Computing Systems , 2018, 2018 IEEE International Conference on Communications (ICC).

[4]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[5]  Sangheon Pack,et al.  The Software-Defined Vehicular Cloud: A New Level of Sharing the Road , 2017, IEEE Vehicular Technology Magazine.

[6]  Peter Auer,et al.  Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.

[7]  Zhisheng Niu,et al.  Task Replication for Vehicular Edge Computing: A Combinatorial Multi-Armed Bandit Based Approach , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[8]  Xin Liu,et al.  Adaptive Exploration-Exploitation Tradeoff for Opportunistic Bandits , 2017, ICML.

[9]  Cheng Huang,et al.  Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges , 2017, IEEE Communications Magazine.

[10]  Xuemin Shen,et al.  Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.

[11]  F. Richard Yu,et al.  Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing , 2017, IEEE Vehicular Technology Magazine.

[12]  Wei Chen,et al.  Combinatorial multi-armed bandit: general framework, results and applications , 2013, ICML 2013.

[13]  Wei Chen,et al.  Combinatorial Multi-Armed Bandit with General Reward Functions , 2016, NIPS.

[14]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.