
From nobody Sat Apr  1 16:20:09 2017
Return-Path: <juraj.giertl@cnl.sk>
X-Original-To: idnet@ietfa.amsl.com
Delivered-To: idnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6972F12946A for <idnet@ietfa.amsl.com>; Sat,  1 Apr 2017 16:19:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cnl.sk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z2L5Lh50OPJV for <idnet@ietfa.amsl.com>; Sat,  1 Apr 2017 16:19:54 -0700 (PDT)
Received: from mail-vk0-x229.google.com (mail-vk0-x229.google.com [IPv6:2607:f8b0:400c:c05::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70CAE128BB7 for <idnet@ietf.org>; Sat,  1 Apr 2017 16:19:53 -0700 (PDT)
Received: by mail-vk0-x229.google.com with SMTP id s68so112003427vke.3 for <idnet@ietf.org>; Sat, 01 Apr 2017 16:19:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cnl.sk; s=googledkim;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=QkZz1aSkGT13SEbJuIoBMJWFS2C+m6wbczxbLbSC0xc=; b=NLndUzrUCiNAMjyfU38G//3W8n/Yrw1SAauDdLb0UhWcsTMmLYHRQHDdjeWqxQaRmQ krdJhcKc2Yy5otnydZgB0GMsoE5SRcSVPCqWviMkYccgPe6U2tQvkQWvyK2Xiftl6xdP uivCC8WUeFjJHgCJscmzZw2v7Of8itus69QaE=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=QkZz1aSkGT13SEbJuIoBMJWFS2C+m6wbczxbLbSC0xc=; b=nVKrnnFD7FxVHxuJ8sNnZys4m1D/maBbvZlTRO2jGXdL36bRzs8bMDCn3VWGaSPp7l mQIknzqqB1eWZrrWLseRXFHLFTI63OAGCPNu80Mv8SaJFeKG0dhIddn2xNlyutS+AJ64 uK1kS4lOq4FQ1paUiCb4xdE01Z43lj1ChuRLTdor7jYgJYI3HzMfnd9+BtK7SBJaAh3M 28hpBcikneRVsQ7xI3GZZZrwRCMr97dDmZp01ZkkPOjwxhzfUzMr1Eqw8UITKLO9pCLD vKbzOucVb1myTrbzf+0HVZxkjwwpYm0QKdbB/dErTBQhZ11fRWi6GVF0TqiJPU0EAFK3 myZg==
X-Gm-Message-State: AFeK/H38yLW+CSObtwwL+c0k7JN1SdNs16Tk9tWM/rKfsttI6T84W/bWQd3v+e4cJYl+JWubgOIzycvlYXs18w==
X-Received: by 10.31.242.134 with SMTP id q128mr4795996vkh.53.1491088793002; Sat, 01 Apr 2017 16:19:53 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.31.184.7 with HTTP; Sat, 1 Apr 2017 16:19:52 -0700 (PDT)
In-Reply-To: <CAHiKxWh_zEAQKxQNL2yoDXawfTVo_jCzPztDfAo7R+Gout6g-w@mail.gmail.com>
References: <3B110B81B721B940871EC78F107D848CF33029@DGGEMM506-MBS.china.huawei.com> <CAHiKxWh_zEAQKxQNL2yoDXawfTVo_jCzPztDfAo7R+Gout6g-w@mail.gmail.com>
From: Juraj Giertl <juraj.giertl@cnl.sk>
Date: Sun, 2 Apr 2017 01:19:52 +0200
Message-ID: <CAJFLd2KAA_ygB5TmWArWOzUkH8CYjJQngRtNEefRmC-aj9wVNg@mail.gmail.com>
To: David Meyer <dmm@1-4-5.net>
Cc: "dingxiaojian (A)" <dingxiaojian1@huawei.com>, "idnet@ietf.org" <idnet@ietf.org>,  Brian E Carpenter <brian.e.carpenter@gmail.com>, Sheng Jiang <jiangsheng@huawei.com>
Content-Type: multipart/alternative; boundary=94eb2c14c6e4d5fdf8054c23295b
Archived-At: <https://mailarchive.ietf.org/arch/msg/idnet/7AqSeqCUuCTHDTmBg7bj8eq6oaA>
Subject: Re: [Idnet] Intelligence-Defined Network Architecture and Call for Interests
X-BeenThere: idnet@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "The IDNet \(Intelligence-Defined Network\) " <idnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idnet>, <mailto:idnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idnet/>
List-Post: <mailto:idnet@ietf.org>
List-Help: <mailto:idnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idnet>, <mailto:idnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Apr 2017 23:19:59 -0000

--94eb2c14c6e4d5fdf8054c23295b
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi all,

such an interesting reading led me to a reminiscence of my 10 years old
experiments with applying some adaptive techniques to the optimization of
network traffic monitoring [0],[1]. Obviously, we were struggling with the
lack of data sets, thus compensated the need for traffic classification
with the Kohonen's self-organizing maps resulting into a simple and rather
effective solution albeit a bit tedious during its initial deployment
(further research would have been necessary, but my job has changed).

Now, at the "operator" side, seeing tons of packets flowing through the
data center network, have no clue how to get and use them. Even though the
anonymization methods are well elaborated (e.g. in [2]), the recent
challenges are of another sort - cannot imagine what would need to be done
for bypassing the legal obligations.

All the best,

Juraj


[0] http://link.springer.com/article/10.1007/s10559-008-9005-0
[1] Adaptive sampling for network monitoring / Juraj Giertl [et al.], In:
ISAST Transactions on Communications and Networking. Vol. 1, no. 1 (2007),
p. 52-61. - ISSN 1797-0989
[2] https://datatracker.ietf.org/doc/html/rfc6235

On Fri, Mar 31, 2017 at 5:08 PM, David Meyer <dmm@1-4-5.net> wrote:

> I don't think there is any question that there is a problem with data
> sets; as many of you know this has been one of my main points regarding
> what is holding back ML for networking over the last 4 or so years. Of
> course, how to solve this problem is a different question.
>
> However, as least I don't necessarily agree with this statement: " So my
> point is data set, not ML model.  We can select some existing models (SVM=
,
> ELM, bayes, etc) to learn different tasks. We do not research the princip=
le
> of ML algorithm, but use them to slove [sic] network problems",  we might
> check out what Andrew says while discussing what the scare resources
> required to make progress in ML for any domain ([0], near the bottom):
>
> o Data. Among leading AI teams, many can likely replicate others=E2=80=99=
 software
> in, at most, 1=E2=80=932 years. But it is exceedingly difficult to get ac=
cess to
> someone else=E2=80=99s data. Thus data, rather than software, is the defe=
nsible
> barrier for many businesses.
>
> o Talent. Simply downloading and =E2=80=9Capplying=E2=80=9D open-source s=
oftware to your
> data won=E2=80=99t work. AI needs to be customized to your business conte=
xt and
> data. This is why there is currently a war for the scarce AI talent that
> can do this work.
>
> There is a ton of experience (and literature) reinforcing these points,
> but suffice it to say that Andrew knows what he's talking about.
>
> In any event, it seems clear that we are all on the same page with respec=
t
> to the problems with data sets (again, exactly how to solve this problem =
is
> open). However,  we seem to have a difference in our understanding of bot=
h
> the field is today and how we make progress. In particular, Andrew seems =
to
> be saying the opposite of what you say above (quoted text). My experience
> tracks more with what Andrew is saying.
>
> Summary:  We need to attack both problems.
>
> Dave
>
> [0] https://hbr.org/2016/11/what-artificial-intelligence-
> can-and-cant-do-right-now
>
>
> On Thu, Mar 30, 2017 at 6:04 PM, dingxiaojian (A) <
> dingxiaojian1@huawei.com> wrote:
>
>> Hi Brian,
>>     You are right.
>>      I have worked in an institute more than five years. The main work
>> is  use ML to solve the domain problem.  However, for privacy reason, it=
's
>> very hard to get some real domain data sets. So the results learned by a=
ny
>> ML models is not reliable.
>>     So I think the important/first thing we do is to construct real and
>> reliable data sets of network domain. Just like UCI repository (
>> https://archive.ics.uci.edu/ml/datasets.html) or images datasets (
>> https://www.cs.utah.edu/~lifeifei/datasets.html) . Only the common and
>> real data sets are agreed with all we, different ML models can be applie=
d
>> to validate and predict.
>>    So my point is data set, not ML model.  We can select some existing
>> models (SVM, ELM, bayes, etc) to learn different tasks. We do not resear=
ch
>> the principle of ML algorithm, but use them to slove network problems.
>>
>>  Best regards,
>>
>> Xiaojian
>>
>>
>> -----=E9=82=AE=E4=BB=B6=E5=8E=9F=E4=BB=B6-----
>> =E5=8F=91=E4=BB=B6=E4=BA=BA: IDNET [mailto:idnet-bounces@ietf.org] =E4=
=BB=A3=E8=A1=A8 Brian E Carpenter
>> =E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4: 2017=E5=B9=B43=E6=9C=8830=E6=97=A5=
 23:37
>> =E6=94=B6=E4=BB=B6=E4=BA=BA: Sheng Jiang <jiangsheng@huawei.com>; David =
Meyer <dmm@1-4-5.net>
>> =E6=8A=84=E9=80=81: idnet@ietf.org
>> =E4=B8=BB=E9=A2=98: Re: [Idnet] Intelligence-Defined Network Architectur=
e and Call for
>> Interests
>>
>> Agreed, and there are (still) two key points:
>>
>> 1. What is our underlying model (what Dave called a "theory of
>> networking")? With no such model, it's very hard to tell the ML system w=
hat
>> to do.
>>
>> 2. And as others have said: get hold of large datasets that can processe=
d
>> by ML according to that model. For developing open solutions, a corpus o=
f
>> open data sets seems essential. As anybody from the network measurement
>> community will tell you, getting hold of large data sets from operators =
is
>> extremely difficult for both privacy and commercial reasons.
>>
>>    Brian
>>
>>
>> On 31/03/2017 03:41, Sheng Jiang wrote:
>> > Hi, David,
>> >
>> > I think I agree with you, but in slight different  expression. Yes, th=
e
>> hard parts of getting ML into Network lies on machine learning. But, it =
is
>> not that we need to develop any new ML technical/algorithms for networki=
ng
>> in particular. It is that we MUST re-set up our network domain knowledge
>> from the perspective of applying ML. My slides [0] does not suggest that
>> *someone else* will handle the ML part. Actually, oppositely, it suggest=
s
>> some experts who have knowledge of both ML and network (probably we) wou=
ld
>> develop tools/algorithms/systems to handle the ML part for other network
>> experts (more than 98 percent of current network administrators). So tha=
t,
>> these network experts would be allowed to manage their network easily wi=
th
>> intelligence association, but no need to become ML experts themselves.
>> Here, we would like to treat the network administrators like the users i=
n
>> other successful ML application. We are the domian experts to do the dir=
ty
>> AI work for them.
>> >
>> > I believe we have common understanding in the above description. But
>> certainly my slides needs further refine to clarify my viewpoint.
>> >
>> > Best regards,
>> >
>> > Sheng
>> > ________________________________
>> > From: IDNET [idnet-bounces@ietf.org] on behalf of David Meyer
>> > [dmm@1-4-5.net]
>> > Sent: 29 March 2017 2:01
>> > To: Sheng Jiang
>> > Cc: idnet@ietf.org
>> > Subject: Re: [Idnet] Intelligence-Defined Network Architecture and
>> > Call for Interests
>> >
>> > s/NMRL/NMLRG/   (sorry about that). Dave
>> >
>> > On Tue, Mar 28, 2017 at 10:59 AM, David Meyer <dmm@1-4-5.net<mailto:
>> dmm@1-4-5.net>> wrote:
>> > Hey Sheng,
>> >
>> > I just wanted to revive my key concern on [0] (same one I made at the
>> NMRL): The hard parts of getting Machine Learning intelligence into
>> Networking is the Machine Learning part. In addition, successful deploym=
ent
>> of ML requires knowledge of ML combined with domain knowledge. We
>> definitely have the domain knowledge; the problem is that we don't have =
the
>> ML knowledge, and this is one of the big factors holding us back; see e.=
g.
>> Andrew's discussion of talent in [1].  Slides such as [0] seem to imply
>> that *someone else* (in particular, not us)  will handle the ML part of =
all
>> of this. I'll just note that in general successful deployments of ML don=
't
>> work this way; the domain experts will have to learn ML (and vice versa)
>> for us to be successful (again, see [1] and many others).
>> >
>> > Perhaps a useful exercise would be to write an ID that makes your
>> assumptions explicit?
>> >
>> > Thanks,
>> >
>> > Dave
>> >
>> >
>> > [0]
>> > https://www.ietf.org/proceedings/97/slides/slides-97-nmlrg-intelligenc
>> > e-defined-network-01.pdf [1]
>> > https://hbr.org/2016/11/what-artificial-intelligence-can-and-cant-do-r
>> > ight-now
>> >
>> >
>> > On Tue, Mar 28, 2017 at 9:29 AM, Sheng Jiang <jiangsheng@huawei.com
>> <mailto:jiangsheng@huawei.com>> wrote:
>> > Hi, all,
>> >
>> > Although there are many understanding for Intelligence-Defined Network=
,
>> we are actually using this IDN as a term reference to the SDN-beyond
>> architecture that we presented in IETF97, see the below link. A referenc=
e
>> model is presented in page 3, while potential standardization works is
>> presented in page 9.
>> >
>> > https://www.ietf.org/proceedings/97/slides/slides-97-nmlrg-intelligenc
>> > e-defined-network-01.pdf
>> >
>> > Although it might be a little bit too early for AI/ML in network givin=
g
>> the recent story of the concluded proposed NMLRG, we still would like to
>> call for interests in IDN. Anybody (on site in Chicago this week) are
>> interested in this or even wider topics regarding to AI/ML in network,
>> please contact me on jiangsheng@huawei.com<mailto:jiangsheng@huawei.com>
>> . Then we may have an informal meeting to discuss some common interests =
and
>> potential future activities (not any activities in IETF, but also other =
STO
>> or experimental trails, etc.)  on Thursday morning.
>> >
>> > FYI, we have already working on a Work Item, called IDN in the ETSI NG=
P
>> (Next Generation Protocol) ISG, links below.
>> >
>> > https://portal.etsi.org/tb.aspx?tbid=3D844&SubTB=3D844
>> > https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=
=3D
>> > 51011
>> >
>> > Meanwhile, please do use this mail list as a forum to discuss any
>> topics that may applying AI/ML into network area.
>> >
>> > Best regards,
>> >
>> > Sheng
>> > _______________________________________________
>> > IDNET mailing list
>> > IDNET@ietf.org<mailto:IDNET@ietf.org>
>> > https://www.ietf.org/mailman/listinfo/idnet
>> >
>> >
>> >
>> >
>> >
>> > _______________________________________________
>> > IDNET mailing list
>> > IDNET@ietf.org
>> > https://www.ietf.org/mailman/listinfo/idnet
>> >
>>
>> _______________________________________________
>> IDNET mailing list
>> IDNET@ietf.org
>> https://www.ietf.org/mailman/listinfo/idnet
>> _______________________________________________
>> IDNET mailing list
>> IDNET@ietf.org
>> https://www.ietf.org/mailman/listinfo/idnet
>>
>
>
> _______________________________________________
> IDNET mailing list
> IDNET@ietf.org
> https://www.ietf.org/mailman/listinfo/idnet
>
>

--94eb2c14c6e4d5fdf8054c23295b
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div><div><div>Hi all,<br><br></div>such an interesti=
ng reading led
 me to a reminiscence of my 10 years old experiments with applying some=20
adaptive techniques to the optimization of network traffic monitoring=20
[0],[1]. Obviously, we were struggling with the lack of data sets, thus=20
compensated the need for traffic classification with the Kohonen&#39;s
 self-organizing maps resulting into a simple and rather effective=20
solution albeit a bit tedious during its initial deployment (further=20
research would have been necessary, but my job has changed).<br><br></div>N=
ow,
 at the &quot;operator&quot; side, seeing tons of packets flowing through t=
he data=20
center network, have no clue how to get and use them. Even though the=20
anonymization methods are well elaborated (e.g. in [2]), the recent=20
challenges are of another sort - cannot imagine what would need to be=20
done for bypassing the legal obligations.<br><br></div><div>All the best,<b=
r><br></div><div>Juraj<br></div></div><br><br>[0] <a href=3D"http://link.sp=
ringer.com/article/10.1007/s10559-008-9005-0" target=3D"_blank">http://link=
.springer.com/<wbr>article/10.1007/s10559-008-<wbr>9005-0</a><br>[1] Adapti=
ve sampling for network monitoring / Juraj Giertl [et
al.], In: ISAST Transactions on Communications and Networking. Vol. 1, no. =
1
(2007), p. 52-61. - ISSN 1797-0989<span><br>[2] <a href=3D"https://datatrac=
ker.ietf.org/doc/html/rfc6235" target=3D"_blank">https://datatracker.ietf.o=
rg/<wbr>doc/html/rfc6235</a></span></div><div class=3D"gmail_extra"><br><di=
v class=3D"gmail_quote">On Fri, Mar 31, 2017 at 5:08 PM, David Meyer <span =
dir=3D"ltr">&lt;<a href=3D"mailto:dmm@1-4-5.net" target=3D"_blank">dmm@1-4-=
5.net</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"l=
tr">I don&#39;t think there is any question that there is a problem with da=
ta sets; as many of you know this has been one of my main points regarding =
what is holding back ML for networking over the last 4 or so years. Of cour=
se, how to solve this problem is a different question.=C2=A0<div><br></div>=
<div>However, as least I don&#39;t necessarily agree with this statement: &=
quot;=C2=A0So my point is data set, not ML model.=C2=A0 We can select some =
existing models (SVM, ELM, bayes, etc) to learn different tasks. We do not =
research the principle of ML algorithm, but use them to slove [sic] network=
 problems&quot;, =C2=A0we might check out what Andrew says while discussing=
 what the scare resources required to make progress in ML for any domain ([=
0], near the bottom):<div><br></div><div><div>o Data. Among leading AI team=
s, many can likely replicate others=E2=80=99 software in, at most, 1=E2=80=
=932 years. But it is exceedingly difficult to get access to someone else=
=E2=80=99s data. Thus data, rather than software, is the defensible barrier=
 for many businesses.</div><div><br></div><div>o Talent. Simply downloading=
 and =E2=80=9Capplying=E2=80=9D open-source software to your data won=E2=80=
=99t work. AI needs to be customized to your business context and data. Thi=
s is why there is currently a war for the scarce AI talent that can do this=
 work.</div><div><br></div><div><div>There is a ton of experience (and lite=
rature) reinforcing these points, but suffice it to say that Andrew knows w=
hat he&#39;s talking about.</div><div><br></div><div>In any event, it seems=
 clear that we are all on the same page with respect to the problems with d=
ata sets (again, exactly how to solve this problem is open). However, =C2=
=A0we seem to have a difference in our understanding of both the field is t=
oday and how we make progress. In particular, Andrew seems to be saying the=
 opposite of what you say above (quoted text). My experience tracks more wi=
th what Andrew is saying.</div><div><br></div><div>Summary: =C2=A0We need t=
o attack both problems.=C2=A0</div></div><div><br></div><div>Dave</div><div=
><br></div><div>[0]=C2=A0<a href=3D"https://hbr.org/2016/11/what-artificial=
-intelligence-can-and-cant-do-right-now" target=3D"_blank">https://hbr.org/=
2016/11/<wbr>what-artificial-intelligence-<wbr>can-and-cant-do-right-now</a=
></div></div><div><br></div></div></div><div class=3D"HOEnZb"><div class=3D=
"h5"><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Thu, Mar =
30, 2017 at 6:04 PM, dingxiaojian (A) <span dir=3D"ltr">&lt;<a href=3D"mail=
to:dingxiaojian1@huawei.com" target=3D"_blank">dingxiaojian1@huawei.com</a>=
&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0=
 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Brian,<br>
=C2=A0 =C2=A0 You are right.<br>
=C2=A0 =C2=A0 =C2=A0I have worked in an institute more than five years. The=
 main work is=C2=A0 use ML to solve the domain problem.=C2=A0 However, for =
privacy reason, it&#39;s very hard to get some real domain data sets. So th=
e results learned by any ML models is not reliable.<br>
=C2=A0 =C2=A0 So I think the important/first thing we do is to construct re=
al and reliable data sets of network domain. Just like UCI repository (<a h=
ref=3D"https://archive.ics.uci.edu/ml/datasets.html" rel=3D"noreferrer" tar=
get=3D"_blank">https://archive.ics.uci.edu/m<wbr>l/datasets.html</a>) or im=
ages datasets (<a href=3D"https://www.cs.utah.edu/~lifeifei/datasets.html" =
rel=3D"noreferrer" target=3D"_blank">https://www.cs.utah.edu/~life<wbr>ifei=
/datasets.html</a>) . Only the common and real data sets are agreed with al=
l we, different ML models can be applied to validate and predict.<br>
=C2=A0 =C2=A0So my point is data set, not ML model.=C2=A0 We can select som=
e existing models (SVM, ELM, bayes, etc) to learn different tasks. We do no=
t research the principle of ML algorithm, but use them to slove network pro=
blems.<br>
<br>
=C2=A0Best regards,<br>
<br>
Xiaojian<br>
<br>
<br>
-----=E9=82=AE=E4=BB=B6=E5=8E=9F=E4=BB=B6-----<br>
=E5=8F=91=E4=BB=B6=E4=BA=BA: IDNET [mailto:<a href=3D"mailto:idnet-bounces@=
ietf.org" target=3D"_blank">idnet-bounces@ietf.org</a><wbr>] =E4=BB=A3=E8=
=A1=A8 Brian E Carpenter<br>
=E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4: 2017=E5=B9=B43=E6=9C=8830=E6=97=A5 23=
:37<br>
=E6=94=B6=E4=BB=B6=E4=BA=BA: Sheng Jiang &lt;<a href=3D"mailto:jiangsheng@h=
uawei.com" target=3D"_blank">jiangsheng@huawei.com</a>&gt;; David Meyer &lt=
;<a href=3D"mailto:dmm@1-4-5.net" target=3D"_blank">dmm@1-4-5.net</a>&gt;<b=
r>
=E6=8A=84=E9=80=81: <a href=3D"mailto:idnet@ietf.org" target=3D"_blank">idn=
et@ietf.org</a><br>
=E4=B8=BB=E9=A2=98: Re: [Idnet] Intelligence-Defined Network Architecture a=
nd Call for Interests<br>
<div class=3D"m_2114070594812689520HOEnZb"><div class=3D"m_2114070594812689=
520h5"><br>
Agreed, and there are (still) two key points:<br>
<br>
1. What is our underlying model (what Dave called a &quot;theory of network=
ing&quot;)? With no such model, it&#39;s very hard to tell the ML system wh=
at to do.<br>
<br>
2. And as others have said: get hold of large datasets that can processed b=
y ML according to that model. For developing open solutions, a corpus of op=
en data sets seems essential. As anybody from the network measurement commu=
nity will tell you, getting hold of large data sets from operators is extre=
mely difficult for both privacy and commercial reasons.<br>
<br>
=C2=A0 =C2=A0Brian<br>
<br>
<br>
On 31/03/2017 03:41, Sheng Jiang wrote:<br>
&gt; Hi, David,<br>
&gt;<br>
&gt; I think I agree with you, but in slight different=C2=A0 expression. Ye=
s, the hard parts of getting ML into Network lies on machine learning. But,=
 it is not that we need to develop any new ML technical/algorithms for netw=
orking in particular. It is that we MUST re-set up our network domain knowl=
edge from the perspective of applying ML. My slides [0] does not suggest th=
at *someone else* will handle the ML part. Actually, oppositely, it suggest=
s some experts who have knowledge of both ML and network (probably we) woul=
d develop tools/algorithms/systems to handle the ML part for other network =
experts (more than 98 percent of current network administrators). So that, =
these network experts would be allowed to manage their network easily with =
intelligence association, but no need to become ML experts themselves. Here=
, we would like to treat the network administrators like the users in other=
 successful ML application. We are the domian experts to do the dirty AI wo=
rk for them.<br>
&gt;<br>
&gt; I believe we have common understanding in the above description. But c=
ertainly my slides needs further refine to clarify my viewpoint.<br>
&gt;<br>
&gt; Best regards,<br>
&gt;<br>
&gt; Sheng<br>
&gt; ______________________________<wbr>__<br>
&gt; From: IDNET [<a href=3D"mailto:idnet-bounces@ietf.org" target=3D"_blan=
k">idnet-bounces@ietf.org</a>] on behalf of David Meyer<br>
&gt; [<a href=3D"mailto:dmm@1-4-5.net" target=3D"_blank">dmm@1-4-5.net</a>]=
<br>
&gt; Sent: 29 March 2017 2:01<br>
&gt; To: Sheng Jiang<br>
&gt; Cc: <a href=3D"mailto:idnet@ietf.org" target=3D"_blank">idnet@ietf.org=
</a><br>
&gt; Subject: Re: [Idnet] Intelligence-Defined Network Architecture and<br>
&gt; Call for Interests<br>
&gt;<br>
&gt; s/NMRL/NMLRG/=C2=A0 =C2=A0(sorry about that). Dave<br>
&gt;<br>
&gt; On Tue, Mar 28, 2017 at 10:59 AM, David Meyer &lt;<a href=3D"mailto:dm=
m@1-4-5.net" target=3D"_blank">dmm@1-4-5.net</a>&lt;mailto:<a href=3D"mailt=
o:dmm@1-4-5.net" target=3D"_blank">dmm@1-4-<wbr>5.net</a>&gt;&gt; wrote:<br=
>
&gt; Hey Sheng,<br>
&gt;<br>
&gt; I just wanted to revive my key concern on [0] (same one I made at the =
NMRL): The hard parts of getting Machine Learning intelligence into Network=
ing is the Machine Learning part. In addition, successful deployment of ML =
requires knowledge of ML combined with domain knowledge. We definitely have=
 the domain knowledge; the problem is that we don&#39;t have the ML knowled=
ge, and this is one of the big factors holding us back; see e.g. Andrew&#39=
;s discussion of talent in [1].=C2=A0 Slides such as [0] seem to imply that=
 *someone else* (in particular, not us)=C2=A0 will handle the ML part of al=
l of this. I&#39;ll just note that in general successful deployments of ML =
don&#39;t work this way; the domain experts will have to learn ML (and vice=
 versa) for us to be successful (again, see [1] and many others).<br>
&gt;<br>
&gt; Perhaps a useful exercise would be to write an ID that makes your assu=
mptions explicit?<br>
&gt;<br>
&gt; Thanks,<br>
&gt;<br>
&gt; Dave<br>
&gt;<br>
&gt;<br>
&gt; [0]<br>
&gt; <a href=3D"https://www.ietf.org/proceedings/97/slides/slides-97-nmlrg-=
intelligenc" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/proc=
eedin<wbr>gs/97/slides/slides-97-nmlrg-<wbr>intelligenc</a><br>
&gt; e-defined-network-01.pdf [1]<br>
&gt; <a href=3D"https://hbr.org/2016/11/what-artificial-intelligence-can-an=
d-cant-do-r" rel=3D"noreferrer" target=3D"_blank">https://hbr.org/2016/11/w=
hat-a<wbr>rtificial-intelligence-can-and<wbr>-cant-do-r</a><br>
&gt; ight-now<br>
&gt;<br>
&gt;<br>
&gt; On Tue, Mar 28, 2017 at 9:29 AM, Sheng Jiang &lt;<a href=3D"mailto:jia=
ngsheng@huawei.com" target=3D"_blank">jiangsheng@huawei.com</a>&lt;mailto:<=
a href=3D"mailto:jiangsheng@huawei.com" target=3D"_blank"><wbr>jiangsheng@h=
uawei.com</a>&gt;&gt; wrote:<br>
&gt; Hi, all,<br>
&gt;<br>
&gt; Although there are many understanding for Intelligence-Defined Network=
, we are actually using this IDN as a term reference to the SDN-beyond arch=
itecture that we presented in IETF97, see the below link. A reference model=
 is presented in page 3, while potential standardization works is presented=
 in page 9.<br>
&gt;<br>
&gt; <a href=3D"https://www.ietf.org/proceedings/97/slides/slides-97-nmlrg-=
intelligenc" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/proc=
eedin<wbr>gs/97/slides/slides-97-nmlrg-<wbr>intelligenc</a><br>
&gt; e-defined-network-01.pdf<br>
&gt;<br>
&gt; Although it might be a little bit too early for AI/ML in network givin=
g the recent story of the concluded proposed NMLRG, we still would like to =
call for interests in IDN. Anybody (on site in Chicago this week) are inter=
ested in this or even wider topics regarding to AI/ML in network, please co=
ntact me on <a href=3D"mailto:jiangsheng@huawei.com" target=3D"_blank">jian=
gsheng@huawei.com</a>&lt;mailto:<a href=3D"mailto:jiangsheng@huawei.com" ta=
rget=3D"_blank">j<wbr>iangsheng@huawei.com</a>&gt; . Then we may have an in=
formal meeting to discuss some common interests and potential future activi=
ties (not any activities in IETF, but also other STO or experimental trails=
, etc.)=C2=A0 on Thursday morning.<br>
&gt;<br>
&gt; FYI, we have already working on a Work Item, called IDN in the ETSI NG=
P (Next Generation Protocol) ISG, links below.<br>
&gt;<br>
&gt; <a href=3D"https://portal.etsi.org/tb.aspx?tbid=3D844&amp;SubTB=3D844"=
 rel=3D"noreferrer" target=3D"_blank">https://portal.etsi.org/tb.asp<wbr>x?=
tbid=3D844&amp;SubTB=3D844</a><br>
&gt; <a href=3D"https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.=
asp?WKI_ID=3D" rel=3D"noreferrer" target=3D"_blank">https://portal.etsi.org=
/webapp<wbr>/WorkProgram/Report_WorkItem.<wbr>asp?WKI_ID=3D</a><br>
&gt; 51011<br>
&gt;<br>
&gt; Meanwhile, please do use this mail list as a forum to discuss any topi=
cs that may applying AI/ML into network area.<br>
&gt;<br>
&gt; Best regards,<br>
&gt;<br>
&gt; Sheng<br>
&gt; ______________________________<wbr>_________________<br>
&gt; IDNET mailing list<br>
&gt; <a href=3D"mailto:IDNET@ietf.org" target=3D"_blank">IDNET@ietf.org</a>=
&lt;mailto:<a href=3D"mailto:IDNET@ietf.org" target=3D"_blank">IDNET@ie<wbr=
>tf.org</a>&gt;<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/idnet" rel=3D"norefer=
rer" target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/idnet</a>=
<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; ______________________________<wbr>_________________<br>
&gt; IDNET mailing list<br>
&gt; <a href=3D"mailto:IDNET@ietf.org" target=3D"_blank">IDNET@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/idnet" rel=3D"norefer=
rer" target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/idnet</a>=
<br>
&gt;<br>
<br>
______________________________<wbr>_________________<br>
IDNET mailing list<br>
<a href=3D"mailto:IDNET@ietf.org" target=3D"_blank">IDNET@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/idnet" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/idnet</a><br>
______________________________<wbr>_________________<br>
IDNET mailing list<br>
<a href=3D"mailto:IDNET@ietf.org" target=3D"_blank">IDNET@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/idnet" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/idnet</a><br>
</div></div></blockquote></div><br></div>
</div></div><br>______________________________<wbr>_________________<br>
IDNET mailing list<br>
<a href=3D"mailto:IDNET@ietf.org">IDNET@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/idnet" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/idnet</a><br>
<br></blockquote></div><br></div>

--94eb2c14c6e4d5fdf8054c23295b--


From nobody Sun Apr  2 16:07:54 2017
Return-Path: <pedro@nict.go.jp>
X-Original-To: idnet@ietfa.amsl.com
Delivered-To: idnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CB14129441 for <idnet@ietfa.amsl.com>; Sun,  2 Apr 2017 16:07:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C9Pcj-FmXvsk for <idnet@ietfa.amsl.com>; Sun,  2 Apr 2017 16:07:50 -0700 (PDT)
Received: from ns2.nict.go.jp (ns2.nict.go.jp [IPv6:2001:df0:232:300::2]) by ietfa.amsl.com (Postfix) with ESMTP id 80A89126C22 for <idnet@ietf.org>; Sun,  2 Apr 2017 16:07:50 -0700 (PDT)
Received: from gw2.nict.go.jp (gw2.nict.go.jp [133.243.18.251]) by ns2.nict.go.jp  with ESMTP id v32N7nvj088142 for <idnet@ietf.org>; Mon, 3 Apr 2017 08:07:49 +0900 (JST)
Received: from mail2.nict.go.jp (mail2.nict.go.jp [133.243.18.15]) by gw2.nict.go.jp  with ESMTP id v32N7nXB088128 for <idnet@ietf.org>; Mon, 3 Apr 2017 08:07:49 +0900 (JST)
Received: from spectre (unknown [133.243.115.68]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail2.nict.go.jp (NICT Mail Spool Server2) with ESMTPS id 3A209A3B5 for <idnet@ietf.org>; Mon,  3 Apr 2017 08:07:49 +0900 (JST)
Date: Mon, 3 Apr 2017 08:07:51 +0900
From: Pedro Martinez-Julia <pedro@nict.go.jp>
To: idnet@ietf.org
Message-ID: <20170402230751.GA9812@spectre>
References: <3B110B81B721B940871EC78F107D848CF33029@DGGEMM506-MBS.china.huawei.com> <CAHiKxWh_zEAQKxQNL2yoDXawfTVo_jCzPztDfAo7R+Gout6g-w@mail.gmail.com> <CAJFLd2KAA_ygB5TmWArWOzUkH8CYjJQngRtNEefRmC-aj9wVNg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <CAJFLd2KAA_ygB5TmWArWOzUkH8CYjJQngRtNEefRmC-aj9wVNg@mail.gmail.com>
User-Agent: Mutt/1.8.0 (2017-02-23)
X-Virus-Scanned: clamav-milter 0.98.7 at zenith2
X-Virus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/idnet/VWCC1w8lCvPXIkmnjoesM7AWRO0>
Subject: Re: [Idnet] Intelligence-Defined Network Architecture and Call for Interests
X-BeenThere: idnet@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "The IDNet \(Intelligence-Defined Network\) " <idnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idnet>, <mailto:idnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idnet/>
List-Post: <mailto:idnet@ietf.org>
List-Help: <mailto:idnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idnet>, <mailto:idnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 Apr 2017 23:07:52 -0000

Hi,

During one of my last side meetings last week I thought that it could be
possible to ask IETF attendees to allow "us" to capture their traffic
(installing sniffers in the APs and routers). If anyone knows if it is
"plausible" and "possible", please let us know. Thank you.

Regards,
Pedro

-- 
Pedro Martinez-Julia
Network Science and Convergence Device Technology Laboratory
Network System Research Institute
National Institute of Information and Communications Technology (NICT)
4-2-1, Nukui-Kitamachi, Koganei, Tokyo 184-8795, Japan
Email: pedro@nict.go.jp
---------------------------------------------------------
*** Entia non sunt multiplicanda praeter necessitatem ***


From g.trimponias@huawei.com  Wed Apr 26 19:47:11 2017
Return-Path: <g.trimponias@huawei.com>
X-Original-To: idnet@ietfa.amsl.com
Delivered-To: idnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42016129443 for <idnet@ietfa.amsl.com>; Wed, 26 Apr 2017 19:47:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level: 
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rCGuZgC55yxg for <idnet@ietfa.amsl.com>; Wed, 26 Apr 2017 19:47:09 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 712A01294D3 for <idnet@ietf.org>; Wed, 26 Apr 2017 19:47:08 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml704-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DLV25730; Thu, 27 Apr 2017 02:47:05 +0000 (GMT)
Received: from SZXEMI404-HUB.china.huawei.com (10.82.75.40) by lhreml704-cah.china.huawei.com (10.201.108.45) with Microsoft SMTP Server (TLS) id 14.3.301.0; Thu, 27 Apr 2017 03:47:04 +0100
Received: from SZXEMI501-MBS.china.huawei.com ([169.254.2.140]) by SZXEMI404-HUB.china.huawei.com ([10.82.75.40]) with mapi id 14.03.0235.001; Thu, 27 Apr 2017 10:47:00 +0800
From: Trimponias Georgios <g.trimponias@huawei.com>
To: "idnet@ietf.org" <idnet@ietf.org>
Thread-Topic: Calll for participation - "Learning Methods for Control of Communication Networks"
Thread-Index: AdK/AInox9N03HgsTV63/jgx6S0Jdg==
Date: Thu, 27 Apr 2017 02:46:59 +0000
Message-ID: <DEA98144A94CBB4D86A91B80AC73FB9648D2481E@SZXEMI501-MBS.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.194.153.192]
Content-Type: multipart/alternative; boundary="_000_DEA98144A94CBB4D86A91B80AC73FB9648D2481ESZXEMI501MBSchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020201.59015BAA.0017, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.2.140, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 536eb6ba5d4ffa237d8a47980fa6b701
Archived-At: <https://mailarchive.ietf.org/arch/msg/idnet/6VFt3MzQO9YtfLhl2Zqxb4hCStE>
X-Mailman-Approved-At: Wed, 26 Apr 2017 19:58:29 -0700
Subject: [Idnet] Calll for participation - "Learning Methods for Control of Communication Networks"
X-BeenThere: idnet@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "The IDNet \(Intelligence-Defined Network\) " <idnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idnet>, <mailto:idnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idnet/>
List-Post: <mailto:idnet@ietf.org>
List-Help: <mailto:idnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idnet>, <mailto:idnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Apr 2017 02:54:46 -0000

--_000_DEA98144A94CBB4D86A91B80AC73FB9648D2481ESZXEMI501MBSchi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Call for Participation
Learning Methods for Control of Communications Networks
RLDM Satellite Meeting
June 14-15 2017
University of Michigan, Ann Arbor

Learning methods have been successfully applied to various control problems=
 in communications networks for more than four decades. Nevertheless, there=
 has yet to be a concerted effort to systematically explore the potential p=
erformance benefits to be reaped by using learning methods in this domain. =
Given the continued growth in the size and dynamics of communications netwo=
rks, in the number and location of communicating devices, and in the volume=
 of traffic to be transported and the types of applications to be supported=
, the algorithms for controlling the behavior of a network should scale acc=
ordingly yet do so under uncertainty about the current state of the entire =
network. Learning methods hold promise for enabling large dynamic communica=
tions networks to effectively, efficiently, and autonomously accommodate in=
creasing and varied user demand. Communications networks also offer in retu=
rn a rich experimental domain for research on learning and decision making.

The goal of this meeting is to foster collaboration between the communicati=
ons networks and learning communities, bringing to bear powerful learning a=
lgorithms for control of communications networks and exposing a complex dom=
ain for research on learning methods. We welcome submissions of original re=
search describing theoretical or empirical results using learning methods f=
or network control. Here, the term 'network control' encompasses decision m=
aking at all time scales, ranging from processing individual packets and fl=
ows to network planning and design. Learning methods that require neither a=
 detailed model of the network nor supervisory input to make appropriate de=
cisions are of particular interest for this meeting.

To participate in the meeting, you must prepare an extended abstract of at =
most four pages, inclusive of figures and references, and must submit the a=
bstract directly to the organizers by 12 May 2017. Abstracts will be used t=
o determine the speakers and the discussion topics for the meeting. Each pa=
rticipant's abstract will be made available electronically as part of the r=
ecord of the meeting, provided the participant explicitly grants permission=
 to do so.

Abstract formatting:
LaTex template: rldmsubmit.sty
LaTex example: rldm.tex
Abstract samples: rldm.pdf, rldm.rtf

Organizers:
Martha Steenstrup, Stow Research L.L.C.
George Trimponias, Huawei Technologies Co., Ltd.


--_000_DEA98144A94CBB4D86A91B80AC73FB9648D2481ESZXEMI501MBSchi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:\65B0\7D30\660E\9AD4;
	panose-1:2 2 5 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@\65B0\7D30\660E\9AD4";
	panose-1:2 2 5 0 0 0 0 0 0 0;}
@font-face
	{font-family:HelveticaNeue-Bold;
	panose-1:0 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:HelveticaNeue;
	panose-1:0 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:HelveticaNeue-BoldItalic;
	panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center;text-aut=
ospace:none">
<b><span style=3D"font-family:&quot;HelveticaNeue-Bold&quot;,sans-serif;col=
or:#444444">Call for Participation<o:p></o:p></span></b></p>
<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center;text-aut=
ospace:none">
<b><span style=3D"font-size:14.0pt;font-family:&quot;HelveticaNeue-Bold&quo=
t;,sans-serif;color:#444444">Learning Methods for Control of Communications=
 Networks<o:p></o:p></span></b></p>
<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center;text-aut=
ospace:none">
<b><span style=3D"font-family:&quot;HelveticaNeue-Bold&quot;,sans-serif;col=
or:#444444">RLDM Satellite Meeting<o:p></o:p></span></b></p>
<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center;text-aut=
ospace:none">
<b><span style=3D"font-family:&quot;HelveticaNeue-Bold&quot;,sans-serif;col=
or:#444444">June 14-15 2017<o:p></o:p></span></b></p>
<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center;text-aut=
ospace:none">
<b><span style=3D"font-family:&quot;HelveticaNeue-Bold&quot;,sans-serif;col=
or:#444444">University of Michigan, Ann Arbor<o:p></o:p></span></b></p>
<p class=3D"MsoNormal" style=3D"text-align:justify;text-justify:inter-ideog=
raph;line-height:12.0pt;mso-line-height-rule:exactly;text-autospace:none">
<span style=3D"font-family:&quot;HelveticaNeue&quot;,sans-serif;color:black=
"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-align:justify;text-justify:inter-ideog=
raph;line-height:12.0pt;mso-line-height-rule:exactly;text-autospace:none">
<span style=3D"font-family:&quot;HelveticaNeue&quot;,sans-serif;color:black=
">L</span><span style=3D"font-family:&quot;HelveticaNeue&quot;,sans-serif;c=
olor:#444444">earning methods have been successfully applied to various con=
trol problems in communications networks for more than four
 decades. Nevertheless, there has yet to be a concerted effort to systemati=
cally explore the potential performance benefits to be reaped by using lear=
ning methods in this domain. Given the continued growth in the size and dyn=
amics of communications networks,
 in the number and location of communicating devices, and in the volume of =
traffic to be transported and the types of applications to be supported, th=
e algorithms for controlling the behavior of a network should scale accordi=
ngly yet do so under uncertainty
 about the current state of the entire network. Learning methods hold promi=
se for enabling large dynamic communications networks to effectively, effic=
iently, and autonomously accommodate increasing and varied user demand. Com=
munications networks also offer
 in return a rich experimental domain for research on learning and decision=
 making.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-align:justify;text-justify:inter-ideog=
raph;line-height:12.0pt;mso-line-height-rule:exactly;text-autospace:none">
<span style=3D"font-family:&quot;HelveticaNeue&quot;,sans-serif;color:#4444=
44"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-align:justify;text-justify:inter-ideog=
raph;line-height:12.0pt;mso-line-height-rule:exactly;text-autospace:none">
<span style=3D"font-family:&quot;HelveticaNeue&quot;,sans-serif;color:#4444=
44">The goal of this meeting is to foster collaboration between the communi=
cations networks and learning communities, bringing to bear powerful learni=
ng algorithms for control of communications
 networks and exposing a complex domain for research on learning methods. W=
e welcome submissions of original research describing theoretical or empiri=
cal results using learning methods for network control. Here,
</span><span style=3D"font-family:&quot;HelveticaNeue&quot;,sans-serif;colo=
r:black">the term <span lang=3D"ZH-TW">
&#8216;</span>network control<span lang=3D"ZH-TW">&#8217;</span> encompasse=
s decision making at all time scales, ranging from processing individual pa=
ckets and flows to network planning and design. L</span><span style=3D"font=
-family:&quot;HelveticaNeue&quot;,sans-serif;color:#444444">earning
 methods </span><span style=3D"font-family:&quot;HelveticaNeue&quot;,sans-s=
erif;color:black">that require neither a detailed model of the network nor =
supervisory input to make appropriate decisions are of particular interest =
for this meeting.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-align:justify;text-justify:inter-ideog=
raph;line-height:12.0pt;mso-line-height-rule:exactly;text-autospace:none">
<span style=3D"font-family:&quot;HelveticaNeue&quot;,sans-serif;color:black=
"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-align:justify;text-justify:inter-ideog=
raph;line-height:12.0pt;mso-line-height-rule:exactly;text-autospace:none">
<span style=3D"font-family:&quot;HelveticaNeue&quot;,sans-serif;color:#4444=
44">To participate in the meeting, you must prepare an extended abstract of=
 at most four pages, inclusive of figures and references, and must submit t=
he abstract directly to the organizers by 12
 May 2017. Abstracts will be used to determine the speakers and the discuss=
ion topics for the meeting. Each participant<span lang=3D"ZH-TW">&#8217;</s=
pan>s abstract will be made available electronically as part of the record =
of the meeting, provided the participant
 explicitly grants permission to do so.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><b><i><span style=3D"f=
ont-size:10.0pt;font-family:&quot;HelveticaNeue-BoldItalic&quot;,sans-serif=
;color:#444444"><o:p>&nbsp;</o:p></span></i></b></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><b><i><span style=3D"f=
ont-size:10.0pt;font-family:&quot;HelveticaNeue-BoldItalic&quot;,sans-serif=
;color:#444444">Abstract formatting</span></i></b><span style=3D"font-size:=
10.0pt;font-family:&quot;HelveticaNeue&quot;,sans-serif;color:#444444">:<o:=
p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"line-height:12.0pt;mso-line-height-rule:exa=
ctly;text-autospace:none">
<span style=3D"font-size:10.0pt;font-family:&quot;HelveticaNeue&quot;,sans-=
serif;color:#444444">LaTex template: rldmsubmit.sty<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"line-height:12.0pt;mso-line-height-rule:exa=
ctly;text-autospace:none">
<span style=3D"font-size:10.0pt;font-family:&quot;HelveticaNeue&quot;,sans-=
serif;color:#444444">LaTex example: rldm.tex<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"line-height:12.0pt;mso-line-height-rule:exa=
ctly;text-autospace:none">
<span style=3D"font-size:10.0pt;font-family:&quot;HelveticaNeue&quot;,sans-=
serif;color:#444444">Abstract samples: rldm.pdf, rldm.rtf<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><b><i><span style=3D"f=
ont-size:10.0pt;font-family:&quot;HelveticaNeue-BoldItalic&quot;,sans-serif=
;color:#444444"><o:p>&nbsp;</o:p></span></i></b></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><b><i><span style=3D"f=
ont-size:10.0pt;font-family:&quot;HelveticaNeue-BoldItalic&quot;,sans-serif=
;color:#444444">Organizers</span></i></b><span style=3D"font-size:10.0pt;fo=
nt-family:&quot;HelveticaNeue&quot;,sans-serif;color:#444444">:<o:p></o:p><=
/span></p>
<p class=3D"MsoNormal" style=3D"line-height:12.0pt;mso-line-height-rule:exa=
ctly;text-autospace:none">
<span style=3D"font-size:10.0pt;font-family:&quot;HelveticaNeue&quot;,sans-=
serif;color:#444444">Martha Steenstrup, Stow Research L.L.C.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal" style=3D"line-height:12.0pt;mso-line-height-rule:exa=
ctly"><span style=3D"font-size:10.0pt;font-family:&quot;HelveticaNeue&quot;=
,sans-serif;color:#444444">George Trimponias, Huawei Technologies Co., Ltd.=
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans=
-serif"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
</div>
</body>
</html>

--_000_DEA98144A94CBB4D86A91B80AC73FB9648D2481ESZXEMI501MBSchi_--

