What If We Had Used a Different App? Reliable Counterfactual KPI Analysis in Wireless Systems
- URL: http://arxiv.org/abs/2410.00150v3
- Date: Thu, 23 Jan 2025 11:39:32 GMT
- Title: What If We Had Used a Different App? Reliable Counterfactual KPI Analysis in Wireless Systems
- Authors: Qiushuo Hou, Sangwoo Park, Matteo Zecchin, Yunlong Cai, Guanding Yu, Osvaldo Simeone,
- Abstract summary: This paper addresses the problem of estimating the values of traffic that would have been obtained if a different app had been implemented by the RAN.
We propose a conformal-prediction-based counterfactual analysis method for wireless systems.
- Score: 52.499838151272016
- License:
- Abstract: In modern wireless network architectures, such as Open Radio Access Network (O-RAN), the operation of the radio access network (RAN) is managed by applications, or apps for short, deployed at intelligent controllers. These apps are selected from a given catalog based on current contextual information. For instance, a scheduling app may be selected on the basis of current traffic and network conditions. Once an app is chosen and run, it is no longer possible to directly test the key performance indicators (KPIs) that would have been obtained with another app. In other words, we can never simultaneously observe both the actual KPI, obtained by the selected app, and the counterfactual KPI, which would have been attained with another app, for the same network condition, making individual-level counterfactual KPIs analysis particularly challenging. This what-if analysis, however, would be valuable to monitor and optimize the network operation, e.g., to identify suboptimal app selection strategies. This paper addresses the problem of estimating the values of KPIs that would have been obtained if a different app had been implemented by the RAN. To this end, we propose a conformal-prediction-based counterfactual analysis method for wireless systems that provides reliable error bars for the estimated KPIs, despite the inherent covariate shift between logged and test data. Experimental results for medium access control-layer apps and for physical-layer apps demonstrate the merits of the proposed method.
Related papers
- Remote Detection of Applications for Improved Beam Tracking in mmWave/sub-THz 5G/6G Systems [37.35086075012511]
Beam tracking is an essential functionality of millimeter wave (mmWave, 30-100 GHz) and sub-terahertz (sub-THz, 100-300 GHz) 5G/6G systems.
It operates by performing antenna sweeping at both base station (BS) and user equipment (UE) sides.
In absence of explicit signalling for the type of application at the air interface, in this paper, we propose a way to remotely detect it at the BS side based on the received signal strength pattern.
arXiv Detail & Related papers (2024-10-24T10:55:21Z) - Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol [2.199918533021483]
We show that 5G radio communication becomes the side channel to precisely infer the user's applications in real-time.
We consider four different categories of applications: online shopping, voice/video conferencing, video streaming, and Over-The-Top (OTT) media platforms.
arXiv Detail & Related papers (2024-07-10T04:39:56Z) - QuTE: decentralized multiple testing on sensor networks with false
discovery rate control [130.7122910646076]
This paper designs methods for decentralized multiple hypothesis testing on graphs equipped with provable guarantees on the false discovery rate (FDR)
We consider the setting where distinct agents reside on the nodes of an undirected graph, and each agent possesses p-values corresponding to one or more hypotheses local to its node.
Each agent must individually decide whether to reject one or more of its local hypotheses by only communicating with its neighbors, with the joint aim that the global FDR over the entire graph must be controlled at a predefined level.
arXiv Detail & Related papers (2022-10-09T19:48:39Z) - Multi-agent reinforcement learning for intent-based service assurance in
cellular networks [1.8352113484137629]
Multi-agent reinforcement learning (MARL) techniques have shown significant promise in many areas in which traditional closed-loop control falls short.
In this work, we propose a method based on MARL to achieve intent-based management without the requirement of the model of the underlying system.
arXiv Detail & Related papers (2022-08-07T14:42:58Z) - Cadence: A Practical Time-series Partitioning Algorithm for Unlabeled
IoT Sensor Streams [1.2330326247154968]
We show that our algorithm can robustly detect time-series events across different applications.
We demonstrate its applicability in a real-world IoT deployment for ambient-sensing based activity recognition.
arXiv Detail & Related papers (2021-12-06T21:13:18Z) - Enabling certification of verification-agnostic networks via
memory-efficient semidefinite programming [97.40955121478716]
We propose a first-order dual SDP algorithm that requires memory only linear in the total number of network activations.
We significantly improve L-inf verified robust accuracy from 1% to 88% and 6% to 40% respectively.
We also demonstrate tight verification of a quadratic stability specification for the decoder of a variational autoencoder.
arXiv Detail & Related papers (2020-10-22T12:32:29Z) - AQD: Towards Accurate Fully-Quantized Object Detection [94.06347866374927]
We propose an Accurate Quantized object Detection solution, termed AQD, to get rid of floating-point computation.
Our AQD achieves comparable or even better performance compared with the full-precision counterpart under extremely low-bit schemes.
arXiv Detail & Related papers (2020-07-14T09:07:29Z) - Network Adjustment: Channel Search Guided by FLOPs Utilization Ratio [101.84651388520584]
This paper presents a new framework named network adjustment, which considers network accuracy as a function of FLOPs.
Experiments on standard image classification datasets and a wide range of base networks demonstrate the effectiveness of our approach.
arXiv Detail & Related papers (2020-04-06T15:51:00Z) - Key Points Estimation and Point Instance Segmentation Approach for Lane
Detection [65.37887088194022]
We propose a traffic line detection method called Point Instance Network (PINet)
The PINet includes several stacked hourglass networks that are trained simultaneously.
The PINet achieves competitive accuracy and false positive on the TuSimple and Culane datasets.
arXiv Detail & Related papers (2020-02-16T15:51:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.