Online Learning for Function Placement in Serverless Computing

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We study the placement of virtual functions aimed at minimizing the cost. We propose a novel algorithm, using ideas based on multi-armed bandits. We prove that these algorithms learn the optimal placement policy rapidly, and their regret grows at a rate at most O(NM √TlnT) while respecting the feasibility constraints with high probability, where T is total time slots, M is the number of classes of function and N is the number of computation nodes. We show through numerical experiments that the proposed algorithm both has good practical performance and modest computational complexity. We propose an acceleration technique that allows the algorithm to achieve good performance also in large networks where computational power is limited. Our experiments are fully reproducible, and the code is publicly available.

Original languageEnglish
Title of host publicationProceedings of the 11th IEEE International Conference on Network Softwarization, NetSoft 2025
EditorsPal Varga, Walter Cerroni, Carol Fung, Robert Szabo, Massimo Tornatore
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages294-302
Number of pages9
ISBN (Electronic)9798331543457
DOIs
Publication statusPublished - 1 Jan 2025
Event11th IEEE International Conference on Network Softwarization, NetSoft 2025 - Budapest, Hungary
Duration: 23 Jun 202527 Jun 2025

Publication series

NameProceedings of the 11th IEEE International Conference on Network Softwarization, NetSoft 2025

Conference

Conference11th IEEE International Conference on Network Softwarization, NetSoft 2025
Country/TerritoryHungary
CityBudapest
Period23/06/2527/06/25

Keywords

  • Multi-Armed Bandits
  • Online Learning
  • Regret Minimization
  • Reinforcement Learning
  • Virtual Function Placement

Fingerprint

Dive into the research topics of 'Online Learning for Function Placement in Serverless Computing'. Together they form a unique fingerprint.

Cite this