LAKUBE: An Improved Multi-Armed Bandit Algorithm for Strongly Budget-Constrained Conditions on Collecting Large-Scale Sensor Network Data
Continuously gathering data from wireless sensor network is one of crucial issue to be resolved. In the problem, there are multiple sensors to be transmitted, however, their data distributions are unknown at the starting point and to know such distributions we should try to gather data from them, and the resources to be used for it is also limited. The problem is often called Budget-Limited Multi-Armed Bandit problem, and several approaches have been proposed. However, often a wireless sensor network has a number of nodes to be retrieved so that it is difficult to try the all nodes to gather their potential possibilities because of very limited budgets, i.e., limited electricity power or limited bandwidth of the network. In this paper, we present an improved BLMAB algorithm that is more suitable for highly budget-constrained situation. The proposed approach can effectively limit sources to be retrieved when a relatively hard budget-limitation has applied. We conduct its experiments on a simulation environment to evaluate the potential performance of the approach.
KeywordsMulti-armed bandit budget-limited multi-armed bandit wireless sensor network simulation
Unable to display preview. Download preview PDF.
- 2.He, T., Vicaire, P., Yan, T., Luo, L., Gu, L., Zhou, G., Stoleru, R., Cao, Q., Stankovic, J.A., Abdelzaher, T.: Achieving real-time target tracking using wireless sensor networks. In: Proceedings of the Twelfth IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 37–48 (2006)Google Scholar
- 3.Simon, G., Ledeczi, A., Maroti, M.: Sensor network-based countersniper system. In: Proceedings of the Second International Conference on Embedded Networked Sensor Systems, pp. 1–12 (2004)Google Scholar
- 4.Boukerche, A.: Algorithms and Protocols for Wireless Sensor Networks. WileyBlackwell (2008) ISBN: 0471798134Google Scholar
- 5.Wagner, D., Wattenhofer, R. (eds.): Algorithms for Sensor and Ad Hoc Networks. LNCS, vol. 4621. Springer, Heidelberg (2007)Google Scholar
- 7.Tran-Thanh, L.: Budget-Limited Multi-Armed Bandits. University of Southampton, Faculty of Physical and Applied Science, Doctoral Thesis (2012)Google Scholar
- 9.Dekorsy, A., Fliege, J., Söllner, M.: Optimal distributed routing and power control decomposition for wireless networks. In: Proceedings of the Fiftieth IEEE Global Telecommunications Conference, pp. 4920–4924 (2007)Google Scholar
- 11.Merrett, G.V.: Energy- and Information-Managed Wireless Sensor Networks: Modelling and Simulation. PhD thesis, University of Southampton, School of Electronics and Computer Science, Southampton, UK (2008)Google Scholar
- 16.Tran-Thanh, L., Chapman, A., de Cote, J.E.M., Rogers, A., Jennings, N.R.: Epsilon-First Policies for Budget-Limited Multi-Armed Bandits. In: Twenty-Fourth AAAI Conference on Artificial Intelligence, Atlanta, USA, Georgia, July 11-15, pp. 1211–1216 (2010)Google Scholar
- 17.Tran-Thanh, L., Chapman, A., Rogers, A., Jennings, N.R.: Knapsack based optimal policies for budget-limited multi-armed bandits. In: Twenty-Sixth AAAI Conference on Artificial Intelligence (AAAI 2012), Toronto, CA, July 22, pp. 1134–1140 (2012)Google Scholar
- 19.Kellerer, H., Pferschy, U., Pisinger, D.: Knapsack Problems. Springer (2004)Google Scholar
- 20.Sano, Y., Kadono, Y., Fukuta, N.: A Performance Optimization Support Framework for GPU-based Traffic Simulations with Negotiating Agents. In: The 7th International Workshop on Agent-based Complex Automated Negotiations (ACAN 2014) (2014)Google Scholar
- 21.Sano, Y., Kadono, Y., Fukuta, N.: A Performance Optimization Support Framework for Multi Agent Simulations on Multi-core Environment. In: The 3rd IIAI International Conference on Advanced Applied Informatics (IIAI AAI 2014), pp. 475–480 (2014)Google Scholar