ML p(r)ior | Bandits meet Computer Architecture: Designing a Smartly-allocated Cache

Bandits meet Computer Architecture: Designing a Smartly-allocated Cache

2016-01-31
1602.00309 | cs.LG
In many embedded systems, such as imaging sys- tems, the system has a single designated purpose, and same threads are executed repeatedly. Profiling thread behavior, allows the system to allocate each thread its resources in a way that improves overall system performance. We study an online resource al- locationproblem,wherearesourcemanagersimulta- neously allocates resources (exploration), learns the impact on the different consumers (learning) and im- proves allocation towards optimal performance (ex- ploitation). We build on the rich framework of multi- armed bandits and present online and offline algo- rithms. Through extensive experiments with both synthetic data and real-world cache allocation to threads we show the merits and properties of our al- gorithms
PDF

Highlights - Most important sentences from the article

Login to like/save this paper, take notes and configure your recommendations

Related Articles

2016-11-17

In recent years deep reinforcement learning (RL) systems have attained superhuman performance in a n… show more
PDF

Highlights - Most important sentences from the article

2015-10-02

Adaptive and sequential experiment design is a well-studied area in numerous domains. We survey and … show more
PDF

Highlights - Most important sentences from the article

2016-03-21

Performance of machine learning algorithms depends critically on identifying a good set of hyperpara… show more
PDF

Highlights - Most important sentences from the article

2019-04-15
1904.07272 | cs.LG

Multi-armed bandits a simple but very powerful framework for algorithms that make decisions over tim… show more
PDF

Highlights - Most important sentences from the article

2019-03-04

The stochastic multi-armed bandit problem is a well-known model for studying the exploration-exploit… show more
PDF

Highlights - Most important sentences from the article

2018-11-28

We consider Bandits with Knapsacks (henceforth, BwK), a general model for multi-armed bandits under … show more
PDF

Highlights - Most important sentences from the article

2013-07-23

We present a formal model of human decision-making in explore-exploit tasks using the context of mul… show more
PDF

Highlights - Most important sentences from the article

2018-12-14

As reinforcement learning algorithms are being applied to increasingly complicated and realistic tas… show more
PDF

Highlights - Most important sentences from the article

2019-03-10

We present prior robust algorithms for a large class of resource allocation problems where requests … show more
PDF

Highlights - Most important sentences from the article

2018-10-18

We consider a structured Multi-Armed bandit problem in which mean rewards of different arms are rela… show more
PDF

Highlights - Most important sentences from the article

2017-11-21

We propose a practical non-episodic PSRL algorithm that unlike recent state-of-the-art PSRL algorith… show more
PDF

Highlights - Most important sentences from the article

2018-10-22

Optimization is commonly employed to determine the content of web pages, such as to maximize convers… show more
PDF

Highlights - Most important sentences from the article

2019-02-26

Effective network slicing requires an infrastructure/network provider to deal with the uncertain dem… show more
PDF

Highlights - Most important sentences from the article

2019-02-01
1902.00532 | cs.LG

We study a budgeted hyper-parameter tuning problem, where we optimize the tuning result under a hard… show more
PDF

Highlights - Most important sentences from the article

2017-10-31

Next-generation wireless deployments are characterized by being dense and uncoordinated, which often… show more
PDF

Highlights - Most important sentences from the article

2019-01-12

We consider an ad hoc network where multiple users access the same set of channels. The channel char… show more
PDF

Highlights - Most important sentences from the article