A new discrete-time multi-constrained K-winner-take-all recurrent network and its application to prioritized scheduling

Po-Lung Tien*

*Corresponding author for this work

Research output: Contribution to journalArticle

1 Scopus citations

Abstract

In this paper, we propose a novel discrete-time recurrent neural network aiming to resolve a new class of multi-constrained K-winner-take-all (K-WTA) problems. By facilitating specially designed asymmetric neuron weights, the proposed model is capable of operating in a fully parallel manner, thereby allowing true digital implementation. This paper also provides theorems that delineate the theoretical upper bound of the convergence latency, which is merely O(K). Importantly, via simulations, the average convergence time is close to O(1) in most general cases. Moreover, as the multi-constrained K-WTA problem degenerates to a traditional single-constrained problem, the upper bound becomes exactly two parallel iterations, which significantly outperforms the existing K-WTA models. By associating the neurons and neuron weights with routing paths and path priorities, respectively, we then apply the model to a prioritized flow scheduler for the data center networks. Through extensive simulations, we demonstrate that the proposed scheduler converges to the equilibrium state within near-constant time for different scales of networks while achieving maximal throughput, quality-of-service priority differentiation, and minimum energy consumption, subject to the flow contention-free constraints.

Original languageEnglish
Article number7553490
Pages (from-to)2674-2685
Number of pages12
JournalIEEE Transactions on Neural Networks and Learning Systems
Volume28
Issue number11
DOIs
StatePublished - 1 Nov 2017

Keywords

  • Energy saving
  • K-winner take all
  • Parallel computation
  • Prioritized scheduling
  • Quality of service (QoS)
  • Recurrent neural network

Fingerprint Dive into the research topics of 'A new discrete-time multi-constrained K-winner-take-all recurrent network and its application to prioritized scheduling'. Together they form a unique fingerprint.

  • Cite this