For ML to provide the best solutions, it is important to continually train the ML models to include the changing scenarios. Various studies have demonstrated that ML is highly suitable for optimizing edge computing systems as rapid mobility and application-induced changes occur at the edge. Machine learning (ML) is expected to play a major role in 5G edge computing. Through experiments on three real datasets implementing two use cases: a location check-in recommendation and a movie recommendation, we demonstrate that our solution converges up to 42% faster than with other decentralized solutions providing up to 9% improvement on average performance metric such as hit ratio and up to 21% improvement on long tail performance compared to decentralized competitors. At the heart of PEPPER reside two key components: a personalized peer-sampling protocol that keeps in the neighborhood of each node, a proportion of nodes that have similar interests to the former and a simple yet effective model aggregation function that builds a model that is better suited to each user. In PEPPER, users gossip model updates and aggregate them asynchronously. To remedy this, we propose PEPPER, a decentralized recommender system based on gossip learning principles. However, FL, and therefore FL-based recommender systems, rely on a central server that can experience scalability issues besides being vulnerable to attacks. In this context, recommender systems based on Federated Learning (FL) appear to be a promising solution for enforcing privacy as they compute accurate recommendations while keeping personal data on the users' devices. etc.), which exposes users to numerous privacy threats. However, to be effective, these systems need to collect and analyze large volumes of personal data (e.g., location check-ins, movie ratings, click rates. Recommender systems are proving to be an invaluable tool for extracting user-relevant content helping users in their daily activities (e.g., finding relevant places to visit, content to consume, items to purchase). This two-year trial has resulted in over 160 million records, created by more than 94’000 users. To demonstrate the applicability of our work, we deploy ConTrib in the Tribler file-sharing application and successfully address free-riding behaviour. We experimentally show that fraud is detected within seconds and with low bandwidth requirements. Our simple fraud detection algorithm is highly scalable, tolerates significant packet loss, and exhibits relatively low fraud detection times. ![]() This is detected through the continuous exchange of random records between peers and by verifying the consistency of incoming records against known ones. Fraud in ConTrib occurs when a peer illegitimately modifies one of the records in its personal ledger. A record describes some work performed by a peer and links to other records. In ConTrib, participants maintain a personal ledger with tamper-evident records. We present ConTrib, a universal mechanism to maintain fairness in decentralized applications by accounting the work performed by peers. Ensuring that users do not consume too many resources without reciprocating is a crucial requirement for the sustainability of such applications. Decentralized applications critically depend on its users working together. Meanwhile, decentralized applications without central authority are gaining traction. Recent developments, however, have shown that these companies often abuse their unprecedented market dominance for selfish interests. “Big Tech” companies provide digital services used by billions of people. We present and discuss the design of TRIBLER, and we show evidence that TRIBLER enables fast content discovery and recommendation at a low additional overhead, and a significant improvement in download performance. ![]() Based on this paradigm's main concepts such as taste buddies and friends, we have designed and implemented the TRIBLER P2P file-sharing system as a set of extensions to BitTorrent. In this paper we present a novel social-based P2P file-sharing paradigm that exploits social phenomena by maintaining social networks and using these in content discovery, content recommendation, and downloading. ![]() However, social phenomena such as friendship and the existence of communities of users with similar tastes or interests may well be exploited in such systems in order to increase their usability and performance. Most current peer-to-peer (P2P) file-sharing systems treat their users as anonymous, unrelated entities, and completely disregard any social relationships between them.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |