Executing Analytics and Fusion Workloads on Transient Computing Resources in Tactical Environments

Transient computing is an emerging paradigm where the availability of resources is uncertain, transient and varies over time. Transiency arises in many environments such as cloud computing, ad-hoc computing, and energy-aware computing and raises many new challenges for applications. In a cyber-physical system, for instance, transiency can cause the availability and capacity of computing, network and sensing resources to vary over time in an unpredictable manner. At the same time, the data produced by sensors in the cyber-physical environment will need to be processed by fusion and analytic tasks that themselves have time-varying resource needs. In this paper, we argue for the use of the transient computing paradigm as a principled approach for handling the challenges seen in highly-dynamic IoT environments. We discuss several challenges in running fusion and analytic workloads in these environments and present initial research directions for addressing these challenges.

[1]  Prateek Sharma,et al.  SpotCheck: designing a derivative IaaS cloud on the spot market , 2015, EuroSys.

[2]  Razvan Pascanu,et al.  Theano: A CPU and GPU Math Compiler in Python , 2010, SciPy.

[3]  Gregory W. Corder,et al.  Nonparametric Statistics : A Step-by-Step Approach , 2014 .

[4]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[5]  Yuan Yu,et al.  TensorFlow: A system for large-scale machine learning , 2016, OSDI.

[6]  John Lygeros,et al.  On the Road Between Robust Optimization and the Scenario Approach for Chance Constrained Optimization Problems , 2014, IEEE Transactions on Automatic Control.

[7]  Johan Tordsson,et al.  How will Your Workload Look Like in 6 Years? Analyzing Wikimedia's Workload , 2014, 2014 IEEE International Conference on Cloud Engineering.

[8]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[9]  L. Haan,et al.  Extreme value theory : an introduction , 2006 .

[10]  Maria Prandini,et al.  Model reduction of switched affine systems , 2016, Autom..

[11]  Prashant J. Shenoy,et al.  Autonomic mix-aware provisioning for non-stationary data center workloads , 2010, ICAC '10.

[12]  Mani Srivastava,et al.  Energy efficient routing in wireless sensor networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[13]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[14]  Johan Tordsson,et al.  Measuring Cloud Workload Burstiness , 2014, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing.

[15]  Xin He,et al.  Flint: batch-interactive data-intensive processing on transient servers , 2016, EuroSys.

[16]  Ada Diaconescu,et al.  The Notion of Self-aware Computing , 2017, Self-Aware Computing Systems.

[17]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[18]  M. Campi,et al.  The scenario approach for systems and control design , 2008 .

[19]  Johan Tordsson,et al.  Analysis and characterization of a video-on-demand service workload , 2015, MMSys.

[20]  Erich M. Nahum,et al.  A measurement-based study of MultiPath TCP performance over wireless networks , 2013, Internet Measurement Conference.

[21]  Xiangliang Zhang,et al.  MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs , 2018, IEEE Transactions on Knowledge and Data Engineering.

[22]  Don Towsley,et al.  Inferring Higher-Order Structure Statistics of Large Networks from Sampled Edges , 2019, IEEE Transactions on Knowledge and Data Engineering.

[23]  Heesung Kwon,et al.  Enhanced object detection via fusion with prior beliefs from image classification , 2017, 2017 IEEE International Conference on Image Processing (ICIP).

[24]  Ameet Talwalkar,et al.  MLlib: Machine Learning in Apache Spark , 2015, J. Mach. Learn. Res..

[25]  Benjamin M. Marlin,et al.  Learning Tree-Structured Detection Cascades for Heterogeneous Networks of Embedded Devices , 2017, KDD.

[27]  Stephen P. Boyd,et al.  Sensor Selection via Convex Optimization , 2009, IEEE Transactions on Signal Processing.

[28]  Prashant J. Shenoy,et al.  Seagull: Intelligent Cloud Bursting for Enterprise Applications , 2012, USENIX Annual Technical Conference.

[29]  Johan Tordsson,et al.  PEAS , 2016, ACM Trans. Model. Perform. Evaluation Comput. Syst..

[30]  Donald F. Towsley,et al.  Efficiently Estimating Motif Statistics of Large Networks , 2013, TKDD.

[31]  Marco C. Campi,et al.  A Sampling-and-Discarding Approach to Chance-Constrained Optimization: Feasibility and Optimality , 2011, J. Optim. Theory Appl..

[32]  Giuseppe Carlo Calafiore,et al.  The scenario approach to robust control design , 2006, IEEE Transactions on Automatic Control.

[33]  Zhen Liu,et al.  Maximizing the Data Utility of a Data Archiving & Querying System through Joint Coding and Scheduling , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[34]  Donald F. Towsley,et al.  Minfer: A method of inferring motif statistics from sampled edges , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).

[35]  Mohammad Rostami,et al.  Braidio: An Integrated Active-Passive Radio for Mobile Devices with Asymmetric Energy Budgets , 2016, SIGCOMM.