Proceedings of the 15th ACM Workshop on Hot Topics in Networks 2016
DOI: 10.1145/3005745.3005750
|View full text |Cite
|
Sign up to set email alerts
|

Resource Management with Deep Reinforcement Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
472
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 821 publications
(473 citation statements)
references
References 13 publications
1
472
0
Order By: Relevance
“…In this thesis, we propose Pensieve,' a system that learns ABR algorithms automatically, without using any pre-programmed models or explicit assumptions about the operating environment. Pensieve uses modern Reinforcement Learning (RL) techniques [20,21,22] to learn a control policy for bitrate adaptation purely through experience. During training, Pensieve starts knowing nothing about the task at hand.…”
Section: Introductionmentioning
confidence: 99%
“…In this thesis, we propose Pensieve,' a system that learns ABR algorithms automatically, without using any pre-programmed models or explicit assumptions about the operating environment. Pensieve uses modern Reinforcement Learning (RL) techniques [20,21,22] to learn a control policy for bitrate adaptation purely through experience. During training, Pensieve starts knowing nothing about the task at hand.…”
Section: Introductionmentioning
confidence: 99%
“…As a policy gradient method of DRL, deep deterministic policy gradient (DDPG) can address a large action space. Thus, DDPG for building DRL‐Flow was employed; DDPG's detailed algorithm is presented in . Because the policy network is represented as a CNN that accepts as input a collection of states s and outputs a probability distribution over all possible actions, this paper used realistic DCN mix‐flow traffic (in our case, the web search workload dataset) to train the CNN through a variant of the REINFORCE algorithm as described in .…”
Section: Resultsmentioning
confidence: 99%
“…However, such studies are not targeted towards cloud users and do not explore resource usage data as a means to detect breaches. Even though machine learning and statistical techniques have been applied before in the context of cloud computing to detect performance anomalies [16], [17], [18], optimize resource allocation [19], and reduce energy usage [20], these approaches have not, to the best of our knowledge, been implemented to defend against resource compromises in public cloud.…”
Section: A Background and Related Workmentioning
confidence: 99%