IEEE2023 Deep Reinforcement Learning Competitive Task Assignment Enterprise Blockchain
IEEE2023 Deep Reinforcement Learning Competitive Task Assignment Enterprise Blockchain
ABSTRACT With the advent of Industry 4.0, the demand of high computing power for tasks such as data
mining, 3D rendering, file conversion and cryptography is continuously growing. To this extent, distributed
and decentralized environments play a fundamental role by dramatically increasing the amount of available
resources. However, there are still several issues in the existing resource sharing solutions, such as the
uncertainty of task running time, the renting price and the security of transactions. In this work, we present
a blockchain-enabled task assignment platform by performance prediction based on Hyperledger Fabric,
an open-source solution for private and permissioned blockchains in enterprise contexts that outperforms
other technologies in terms of modularity, security and performance. We propose a model-free deep
reinforcement learning framework to predict task runtime in agents current load state while the agent is
engaged in multiple concurrent tasks. In addition, we let clients choose between prediction accuracy and
price saving on each request. This way, we implicitly give inaccurate agents a chance to get assignments
by competing in price rather than in time, allowing them to collect new experiences and improve future
predictions. We conduct extensive experiments to evaluate the performance of the proposed scheme.
INDEX TERMS Blockchain, cloud, deep reinforcement learning (DRL), resource sharing.
non-analytic methods, such as Support Vector Machines or proposed in [3] and [4], which are restricted to only some
Artificial Neural Networks are used. Although most of these classes of platforms and applications, the novel method is
approaches are quite accurate, they cannot be easily used in neither application-specific or platform-dependent and is able
modern Cloud environments for at least three reasons: to work in a generic cloud environment in which, for each
agent, a certain number of concurrent different processes are
i) they are too application-specific or platform-dependent
running. The main objective of the proposed approach is
and, therefore, they have a limited field of application;
to find, according to the client preferences, the agent that
ii) they are intended for single-core processors or for a
completes the execution in least time or, in alternative, the
specific class of multi-core architectures and they do
cheapest agent.
not consider the vast class of available platforms;
Differently from [9], which is focused mostly on the
iii) they assume a free workload context in which the
use of Blockchain for the implementation of optimal auc-
underlying resources are not being used by other con-
tion and bidding strategies, we leverage on Hyperledger
current processes, which is unrealistic in a typical
Fabric to manage both the agent selection process by auc-
Cloud environment.
tion and the task execution. In addition, we adopt a DRL
Indeed, these limitations are reflected in some recent incremental learning approach [10] to enable each agent to
works. For example, in [3], the proposed performance pre- predict task runtime and therefore place a bid for a sub-
diction approach is restricted to scientific applications on mitted task. The proposed DRL-based algorithm overcomes
HPC Cluster platforms. In contrast, the method proposed the limitations of [8] as it does not assume any preliminary
in [4] is not application-specific but it is restricted to Grid consumption-related information in advance.
environments. Moreover, many of the existing works, such In more detail, the paper contributions are listed as follows:
as [5] and [6], suggest an offline approach, whereas all mod-
1) A Blockchain-based trading platform is designed
ern applications require an online continuous incremental
on top of Hyperledger Fabric to orchestrate clients
learning.
requests, agents bids and resulting task assignment.
As a result, due also to the heterogeneity of the applications
We formulate a double bidding strategy according to
and the volatility of configuration and availability of the
client preferences. On the one hand, agents provide
underlying resources, the existing methods are not generally
both a runtime estimation and a price. On the other
applicable in a Cloud environment.
hand, clients choice between the least price and the
In alternative, the adoption of Reinforcement Learning-
least estimated time according to their current setting.
based (RL) techniques is a valid approach. In [7] and [8],
2) A model-free DRL framework for task runtime esti-
the authors propose RL-based methods for solving specific
mation to support the agent selection process. The
resource management and task mapping problems and min-
proposed algorithm enables the agent to incrementally
imizing application runtime by prediction. However, [7] is
learn how to do predictions for generic tasks repre-
restricted to the problem of optimizing the performance of
sented by only two parameters, considering its current
communication bound applications on parallel computing
load in terms of resources consumption and already
systems. In contrast, [8] proposes a mapping problem for
running tasks.
generic tasks in a multi-resource cluster but, in its prediction
approach, it assumes that the resource demand for each task To the best of our knowledge, it is the first time that Hyper-
is known in advance. When it comes to Cloud environments, ledger Fabric Blockchain and DRL are combined together for
this is certainly a strong assumption as the task demands are task assignment orchestration and performance prediction.
not necessarily known upon arrival on the system. In this regard, in our previous works [11] and [12], we pro-
In addition, decentralization is another key factor in Cloud pose a similar framework, which is based on Ethereum [13]
environments. In fact, in a typical scenario multiple resources and implements a traditional offline deep learning-based pre-
are available from different locations on a variable time-based diction strategy, rather than the incremental online approach
fee. The resulting resources trading problem among nodes proposed in [13].
poses several security and integrity issues for transactions that We conduct extensive experiments to evaluate the perfor-
have been addressed in recent literature with auction systems mance of the proposed DRL algorithm with different training
implemented on Blockchain, a popular secure distributed factors. In particular, we show how it works by varying
ledger technology, and combined with RL-based techniques discount factor, number of episodes and policy exploration
for various optimization objectives such as maximizing par- vs. exploitation probability.
ticipants payoff, minimizing energy consumption or adjusting The rest of the paper is organized as follows: Section II
block size [9]. gives some preliminaries on Blockchain, Hyperledger Fabric
In this paper, we overcome the limitations of the exist- and DRL. Section III describes some works about perfor-
ing methods and we formulate a task assignment prob- mance prediction, DRL-based task assignment algorithms
lem by performance prediction for Cloud applications in and resources trading systems in Blockchain environments
a multi-agent environment that is based on an incremen- combined with DRL. Section IV introduces the proposed
tal online learning process. Diversely from the approaches system model. The DRL-based task assignment approach is
focus on a specific application type and platform and there- introduce an Ethereum-based Blockchain to safely manage
fore there’s a lack of independent solutions able to work in data sharing with a DRL approach to achieve the maximum
unknown environments. amount of collected data, geographic fairness and minimize
Resource management and task assignment are two other energy consumption. Several simulations experiments show
problems that have received great attention in the related that their method outperforms traditional database based
literature. In this context, the DRL approach, that is often used approaches in terms of reliability and security.
for intelligent-robot related problems such as optimal path In [32], a smart grid blockchain combined with fog com-
planning and obstacle avoidance [28], has recently become puting is suggested. This work includes a Hyperledger Fabric
very popular. For instance, in [8], a multi-resource cluster Blockchain in which the nodes are part of a fog computing
scheduler named DeepRM is presented that is able to learn environment. A verifiable random function is proposed to
how to manage resources directly from experience in an ensure randomness and increase safety in the selection of
online fashion and to optimize various objectives such as the primary node while keeping the probability proportional
minimizing average job slowdown or completion time. The to the computing power provided by each member. Based
authors show that their method performs comparably to state- on storage cost and security constraints, a DRL scheme is
of-the-art heuristics, adapts to different conditions and con- implemented to adjust the block size and the block interval
verges relatively quickly. in the proposed Blockchain. By conducting extensive simu-
In [7], a DRL approach for solving task mapping problems lations, the authors show the superiority of their scheme in
with dynamic traffic on parallel systems is discussed. The terms of throughput and latency. A similar approach, though
algorithm explores better task mappings by using a network intended to decrease energy consumption and to improve the
simulator that predicts performance and runtime commu- efficiency of the consensus process in Blockchain-enabled
nication behaviors. Since communication pattern are often Industrial Internet of Things systems by adjusting block size
changing and unknown, network performance is difficult to and offloading some tasks to computing servers, is suggested
be accurately estimated, therefore the authors claim that DRL in [33]. The problem is formulated as a high-dynamic and
is an efficient solution in this dynamic context and show that high-dimensional Markov Decision Process for whom a DRL
their method performs comparably or better than previous approach is used to converge to an optimal solution.
approaches. A peer-to-peer energy trading problem among microgrids
Diversely from the aforementioned works, the DRL is investigated in [34]. In this work a multi-agent deep deter-
approach proposed in this paper does not rely on a specific ministic policy gradient, based on energy trading algorithm,
class of application, but it is intended to be an abstract frame- is proposed to enable each microgrid to maximize its own
work combined with modern container based technologies, utility in a local market. Given the uncertainties and the con-
such as Docker, with the purpose to learn the behavior and straints in renewable energy and power demand, the authors
estimate the execution time of a generic software task that claim that the DRL-based approach is suitable to help each
can be packed in a container image and can be monitored by microgrid to find its optimal policy. An Ethereum Blockchain
Docker resources metrics in a competitive environment. is adopted to ensure the integrity of transaction data.
Blockchain-enabled solutions for a vast range of problems A Blockchain-enabled computing resource trading system
have been recently arising. For example, in our previous is proposed in [9]. This system takes into account pricing
works [11] and [12], a Smart Contracts-based platform is and bidding strategies to enable providers and customers
proposed for improving digital processes in a Cloud man- to trade computing resources on a safe and tamper-proof
ufacturing environment. In detail, we combine Blockchain environment. A decision-making problem in the continuous
with Docker and Cloud Storage and introduce a deep learning double auction is formulated with the goal of maximizing
approach in a task mapping framework. In [29], a blockchain- each participant payoffs, while a DRL approach is adopted
based two-stage secure spectrum intelligent sensing and shar- to help them building their optimal bidding strategies. The
ing auction mechanism for mobile devices is designed in authors conduct extensive simulations and show that their
a consortium blockchain to guarantee secure and efficient scheme outperforms other existing methods.
spectrum auction with low complexity. In [30], the authors Finally, in [35], a DRL approach is used to solve a joint
introduce a novel scalable and multi-layer blockchain-based optimization problem to enhance adaptivity and scalability in
energy trading framework for cooperative microgrid sys- Blockchain environments. The proposed approach considers
tems that considers the issue of of perceiving the sta- the optimal selection of consensus protocols and the alloca-
tus of block generation over temporary network disruption tion of computation and bandwidth resources. The authors
and improves the consensus and the reliability of energy show through extensive simulations the effectiveness of their
trading. scheme.
Moreover, several recent works have been proposed
addressing security, data integrity and optimization problems IV. SYSTEM MODEL
with a combination of Blockchain and DRL. For instance, In this section, we introduce a new system that combines
in [31], a reliable data collection and a secure sharing a novel runtime estimation algorithm based on DRL in a
scheme for smart mobile terminals are proposed. The authors competitive task assignment framework safely managed by
a Hyperledger-based Enterprise Blockchain. The proposed the strategy and the task details. Considering the used strat-
architecture is depicted in Fig. 1. The system is made up egy, we define two alternative options: time-sensitive and
of three layers: the Blockchain layer in the middle, and the price-sensitive. In the first case, we assume that the client
Agent and Client layers on the sides. objective is to complete the task in the least time possi-
ble, regardless of the charged fee. In the second case, the
A. BLOCKCHAIN LAYER requirement is to pay the lowest fee, regardless of the exe-
Let us consider a set of pre-authorized organizations O = cution time. In order to specify task details, we define the set
{o1 , o2 , on , . . . , o|O| }, called providers, that constitute the T = {t1 , . . . , tk , . . . , t|T | }, where tk represents a generic task
nodes of the permissioned Hyperledger Blockchain. An orga- that can be requested by the clients with an arbitrary input
nization in Hyperledger Fabric is simply a firm that decides parameter.
to join a network and that is authorized by other existing Now, each request ri,j can be defined by a triple ri,j =
members. Note that symbol |A| denotes the cardinality of the ⟨gi,j , ti,j , pi,j ⟩, where gi,j ∈ [0, 1] is the strategy, with 0 repre-
generic set A. Moreover, each provider on delivers a set of senting time-sensitive and 1 price-sensitive, ti,j = tk ∈ T is
peers Pn = {pn,1 , . . . , pn,i , . . . , pn,|Pn | } joining the network, the required task and pi,j is the input argument.
where pn,i is the i-th peer of provider on . Each provider on
has one Certification Authority CAn to provide and renew C. AGENT LAYER
certificates for Agents, Clients and other components. All Each request ri,j submitted by a client requires an Agent to
peers in the set Pn hold a copy of the chaincode CH and of execute the associated task. In this fully distributed environ-
the ledger L. The chaincode CH is the main Smart Contract ment, we define the set of agents A = {a1 , . . . , am , . . . , a|A| },
that regulates the requests of the clients, the bids received by where am is a node that joins the network and provides
the agents and coordinates the task assignment process. The its computational resources, such as CPU and memory,
ledger L stores the current state of the tasks and the related to the system. For the sake of generalization, we use Docker
transactions. Finally, the Orderer node OD is responsible for container-based technology to embed the tasks in self-
packaging transactions into blocks and distributing them to dependent images. In this way, since everything is packed in
the peers in the sets Pn across the network. the Docker image, the nodes do not have any constraint in
terms of operating system and dependencies.
B. CLIENT LAYER Now, at each request ri,j , we associate an agent am ∈ A that
In the proposed system, we define the set of clients C = is denoted ai,j . Such an agent is paid a variable fee upon suc-
{c1 , . . . , , ci , . . . , c|C| }, where ci implements a step of a cessful execution of the related task. Moreover, since for each
generic process flow, for which it is required to run com- agent am we allow the execution of concurrent processes, the
putationally intensive tasks. Since ci may not have enough execution time strictly depends on its current load state.
resources to run tasks locally, it interacts with the Blockchain As illustrated in section IV-B, the client can choose
to submit execution requests. For each successful task execu- between time-sensitive and price-sensitive strategies. More
tion, a variable fee is charged. specifically, when the former strategy is chosen, the client
For each ci , we define the set goal is to minimize the run-time of its processes and thus
each agent am is required to provide a reliable prediction of
Ri = {ri,1 , . . . , ri,j , . . . , ri,|Ri | }
the execution time for each request rn,i based on its current
where ri,j represents the j-th execution request of client ci . state. Conversely, in case the latter strategy is selected, only
In addition, for each request ri,j , the client ci has to specify the proposed price is relevant for the assignment. The main
1) State Space (S): We assume that each agent is able TABLE 1. Node configuration features.
to run a fixed number k of concurrent tasks as indi-
vidual containers. As a consequence, execution time is
potentially impacted by three combined parameters to
be considered on a new incoming request ri,j :
Step 1:
Initialize replay memory set D with capacity N
Initialize Q(Sm , ebt) arbitrarily
Step 2:
Set e = 1
while e ≤ E do
Set î = 1
while î ≤ I do
Wait for request ri,j in order to get new θ for next iteration h + 1. The target
With probability ϵ select a random action network is updated every w iterations to stabilize learning,
ebt where w must be preliminary assigned.
otherwise select ebt = max Q(s, ebt; θ)
ebt VI. PERFORMANCE EVALUATION
Set eti,j,m = ebt
In this section, we evaluate the performance of the proposed
Set arbitrary price pri,j,m
task runtime prediction DQN driven algorithm in a simulated
Set bi,j,m = ⟨eti,j,m , pri,j,m ⟩
environment.
Send bi,j,m to Smart Contract and wait for
Algorithm 1
A. SIMULATION SETTINGS
Step 3:
if agent am is the winner then In the proposed case study, we identify three common soft-
Take action et i,j,m = ebt, observe ware algorithms with different complexities to evaluate the
RDi,j,m , Sm′ proposed system, therefore we set T = {t1 , t2 , t3 }. We code
Step 4: the tasks using Python language in a single Docker image
Wait for next request ri,j ′ that requires two parameters on launch: task ti,j ∈ T and
Store transition parameter pi,j . In the considered case, the value of pi,j is
trh = ⟨Sm , et i,j,m , RDi,j,m , Sm′ ⟩ in D restricted to the members of the set P = {1, . . . , 5} with
Sample random minibatch of M pi,j ∈ P.
transitions In particular, we consider the following three well known
Dh = {tb1 , tb2 , tbn , . . . , tbM } where algorithms:
tbn ∈ D 1) Standard Array Sorting (t1 ): it builds a random big
foreach tbn ∈ Dh do Python integer list whose number of elements is based
Set
yn ← on pi,j . After building the list, the sort method is called
RDi,j,m,n that implements the Timsort algorithm [37]. This algo-
′
for terminal Sm,n rithm has a runtime complexity of O(n log n) in the
RDi,j,m,n + worst case;
γ max Q(Sm,n ′
, et ′ i,j,m ; θ) 2) Fast Array Sorting (t2 ): instead of constructing a
et i,j,m list, a random NumPy [38] integer array is built that
for non-terminal S ′
also implements the sort method. However, in NumPy
m,n
end library the quicksort algorithm [39] is adopted which
Step 5: has a runtime complexity of O(n2 ) in the worst case;
Perform gradient descent step on 3) Dijkstra Shortest Path Search (t3 ): The Dijkstra’s
(yn − Q(Sm,n , et i,j,m,n ; θ))2 where algorithm [40] is an algorithm for finding the shortest
n = 1, 2, . . . , M paths between nodes in a graph. In this implementation,
Sm ← Sm′ firstly we build a graph with a large number of vertices
Set î = î + 1 V determined by parameter pi,j . Secondly, we find the
end shortest path from the first vertex to all other vertices.
Set e = e + 1 The Dijkstra standard implementation has a complexity
end
of O((|V | + |E|) log |V |) in the worst case.
end
The proposed algorithms are currently implemented in
scientific and industrial applications. For example, sorting
tasks are used in operations research to implement both the
predicted from target network Q and discounted by γ is Shortest Processing Time First and the Longest Processing
calculated as updated reward for each transition tbn ∈ Dh . Time First rules for optimal jobs scheduling and load bal-
Finally, in Step 5, a new Q network is trained by perform- ancing [41]. Indeed, Dijkstra’s algorithm is currently been
ing a gradient descent step on (yn − Q(Sm,n , et i,j,m,n ; 2))2 , used for a vast class of problems including vehicle path
FIGURE 3. (a), (b), (c), tasks average runtime for different values of parameter pi ,j .
FIGURE 5. First scenario performance evaluated for different values of γ : FIGURE 6. Second scenario performance evaluated for different values of
(a) Average reward over episodes, (b) Runtime prediction accuracy γ : (a) Average reward over episodes, (b) Runtime prediction accuracy
summary statistics. summary statistics.
the whole action space to improve its knowledge about Figures 5a and 6a compare the average values CR
each action for a long-term benefit. On the other hand, vs. episodes for all three considered discount factors
exploitation means that the agent uses only its current in both scenarios. For all values of γ , as the agent
knowledge to get the most reward. In Algorithm 2, the explores new actions and trains its Q-function, the
choice between exploration and exploitation is made CR value increases almost linearly and results in 46%
with a probability coefficient ϵ that usually varies performance improvement at the end of the training,
at each episode. Normally, this value starts from 1, compared to the first exploration-only episode. More-
meaning that, since the agent doesn’t know anything over, though γ = 0.2 appears to learn faster than
at the beginning about the actions, it must explore all γ = 0.5 and γ = 0.8, in the end the performance of
available actions for each state. Successively, it slowly the highest discount factors outperforms the smallest
decays over future episodes until the training end, when one. In the last part of the training, the value of ϵ
it is very close to 0, meaning that it fully levarages on becomes very small and let the algorithm leverage only
its knowledge. For the performed evaluations, we start on exploitation for task runtime prediction. In this case,
from ϵ = 1 and we implement a linear decaying strat- the comparison shows that for higher values of γ , the
egy over episodes till a minimum value of ϵ = 0.001. accuracy of the Q-function slightly improves proving
Considering the aforementioned hyper-parameters, we are that the proposed DRL approach is able to catch a
interested in comparing the following two metrics for both sort of correlation between successive submitted tasks.
scenarios. There are no major differences between the perfor-
1) Cumulative Reward CR is defined for single episode mance of the two scenarios. It can only be observed that
of n steps as: in the second scenario, the learning speed for γ = 0.8 is
X higher than in the first scenario, compared to other val-
CR = R(n); CR ∈ [0, Cmax n]. (2) ues of γ . This metric can be influenced by the different
n number of steps in the episode and the resulting value
[26] M. H. Hilman, M. A. Rodriguez, and R. Buyya, ‘‘Task runtime prediction GAETANO VOLPE received the M.Sc. degree
in scientific workflows using an online incremental learning approach,’’ in in computer and automation engineering from
Proc. IEEE/ACM 11th Int. Conf. Utility Cloud Comput. (UCC), Dec. 2018, eCampus University, Novedrate, Italy, in 2020.
pp. 93–102. He is currently pursuing the Ph.D. degree with
[27] T. Pham, J. J. Durillo, and T. Fahringer, ‘‘Predicting workflow task execu- the Laboratory of Control and Automation,
tion time in the cloud using a two-stage machine learning approach,’’ IEEE Polytechnic University of Bari. He is also an inde-
Trans. Cloud Comput., vol. 8, no. 1, pp. 256–268, Jan. 2020. pendent consultant for private companies in the
[28] L. Jiang, H. Huang, and Z. Ding, ‘‘Path planning for intelligent robots
field of cybersecurity, IT infrastructures, and soft-
based on deep Q-learning with experience replay and heuristic knowl-
edge,’’ IEEE/CAA J. Autom. Sinica, vol. 7, no. 4, pp. 1179–1189,
ware architectures. His research interests include
Jul. 2020. cybersecurity topics, blockchains in manufactur-
[29] R. Zhu, H. Liu, L. Liu, X. Liu, W. Hu, and B. Yuan, ‘‘A blockchain- ing environments, discrete-event systems, and petri nets.
based two-stage secure spectrum intelligent sensing and sharing auction
mechanism,’’ IEEE Trans. Ind. Informat., vol. 18, no. 4, pp. 2773–2783,
Apr. 2022.
[30] H. Huang, W. Miao, Z. Li, J. Tian, C. Wang, and G. Min, ‘‘Enabling energy
AGOSTINO MARCELLO MANGINI (Senior
trading in cooperative microgrids: A scalable blockchain-based approach
Member, IEEE) received the Laurea degree in
with redundant data exchange,’’ IEEE Trans. Ind. Informat., vol. 18, no. 10,
pp. 7077–7085, Oct. 2022.
electronics engineering and the Ph.D. degree in
[31] C. H. Liu, Q. Lin, and S. Wen, ‘‘Blockchain-enabled data collection and electrical engineering from the Polytechnic Uni-
sharing for industrial IoT with deep reinforcement learning,’’ IEEE Trans. versity of Bari, Bari, Italy, in 2003 and 2008,
Ind. Informat., vol. 15, no. 6, pp. 3516–3526, Jun. 2019. respectively. He has been a Visiting Scholar with
[32] W. Zheng, W. Wang, G. Wu, C. Xue, and Y. Wei, ‘‘Fog computing enabled the University of Zaragoza, Zaragoza, Spain. He is
smart grid blockchain architecture and performance optimization with currently an Associate Professor with the Depart-
DRL approach,’’ in Proc. IEEE 8th Int. Conf. Comput. Sci. Netw. Technol. ment of Electrical and Information Engineering,
(ICCSNT), Nov. 2020, pp. 41–45. Polytechnic University of Bari. He has authored
[33] L. Yang, M. Li, P. Si, R. Yang, E. Sun, and Y. Zhang, ‘‘Energy-efficient or coauthored over 90 printed publications. His current research interests
resource allocation for blockchain-enabled industrial Internet of Things include modeling, simulation, control of discrete-event systems, petri nets,
with deep reinforcement learning,’’ IEEE Internet Things J., vol. 8, no. 4, supply chains and urban traffic networks, distribution and internal logistics,
pp. 2318–2329, Feb. 2021. the management of hazardous materials, the management of drug distribution
[34] Y. Xu, L. Yu, G. Bi, M. Zhang, and C. Shen, ‘‘Deep reinforcement learning systems, and healthcare systems. He was on the Program Committees of
and blockchain for peer-to-peer energy trading among microgrids,’’ in
the 20072015 IEEE International SMC Conference on Systems, Man, and
Proc. Int. Conf. Internet Things (iThings) IEEE Green Comput. Commun.
Cybernetics and the 2009 IFACWorkshop on Dependable Control of Discrete
(GreenCom) IEEE Cyber, Phys. Social Comput. (CPSCom) IEEE Smart
Data (SmartData) IEEE Congr. Cybermatics (Cybermatics), Nov. 2020, Systems. He was on the Editorial Board of the 2017 IEEE Conference on
pp. 360–365. Automation Science and Engineering.
[35] C. Qiu, X. Ren, Y. Cao, and T. Mai, ‘‘Deep reinforcement learning empow-
ered adaptivity for future blockchain networks,’’ IEEE Open J. Comput.
Soc., vol. 2, pp. 99–105, 2021.
[36] A. A. Donovan and B. W. Kernighan, The Go Programming Language, MARIA PIA FANTI (Fellow, IEEE) received
1st ed. Reading, MA, USA: Addison-Wesley, 2015. the Laurea degree in electronic engineering from
[37] N. Auger, V. Jugé, C. Nicaud, and C. Pivoteau, ‘‘On the worst-case com- the University of Pisa, Pisa, Italy, in 1983. She
plexity of TimSort,’’ in Proc. 26th Annu. Eur. Symp. Algorithms (ESA), was a Visiting Researcher with the Rensselaer
vol. 112, Y. Azar, H. Bast, and G. Herman, Eds. Dagstuhl, Germany:
Polytechnic Institute of Troy, New York, in 1999.
Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2018, pp. 4:1–4:13.
Since 1983, she has been with the Depart-
[38] C. R. Harris, K. J. Millman, S. J. van der Walt, R. Gommers,
P. Virtanen, D. Cournapeau, E. Wieser, J. Taylor, S. Berg, N. J. Smith, and ment of Electrical and Information Engineering,
R. Kern, ‘‘Array programming with NumPy,’’ Nature, vol. 585, no. 7825, Polytechnic University of Bari, Italy, where she is
pp. 357–362, Sep. 2020. currently a Full Professor in system and control
[39] C. A. Hoare, ‘‘Quicksort,’’ Comput. J., vol. 5, no. 1, pp. 10–16, 1962. engineering and the Chair of the Laboratory of
[40] E. W. Dijkstra, ‘‘A note on two problems in connexion with graphs,’’ Automation and Control. Her research interests include management and the
Numerische Math., vol. 1, no. 1, pp. 269–271, Dec. 1959. modeling of complex systems, such as transportation, logistics and manufac-
[41] R. Sedgewick and K. Wayne, Algorithms, 4th ed. Reading, MA, USA: turing systems, discrete event systems, petri nets, consensus protocols, and
Addison-Wesley, 2011. fault detection. She has published more than 315 papers and two textbooks
[42] D.-D. Zhu and J.-Q. Sun, ‘‘A new algorithm based on Dijkstra for vehicle on her research topics. She was a Senior Editor of the IEEE TRANSACTIONS
path planning considering intersection attribute,’’ IEEE Access, vol. 9, ON AUTOMATION SCIENCE AND ENGINEERING and an Associate Editor of the
pp. 19761–19775, 2021. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS. She was a
[43] A. Buzachis, A. Celesti, A. Galletta, J. Wan, and M. Fazio, ‘‘Evaluating Member at Large of the Board of Governors of the IEEE Systems, Man, and
an application aware distributed Dijkstra shortest path algorithm in hybrid
Cybernetics Society. She is currently a member of the AdCom of the IEEE
cloud/edge environments,’’ IEEE Trans. Sustain. Comput., vol. 7, no. 2,
Robotics and Automaton Society and the Chair of the Technical Committee
pp. 289–298, Apr. 2022.
[44] D. Harris and S. Harris, Digital Design and Computer Architecture, 2nd ed. on Automation in Logistics of the IEEE Robotics and Automation Society.
Oxford, U.K.: Morgan Kaufmann, 2012. She was the General Chair of the 2011 IEEE Conference on Automation Sci-
[45] F. S. Perotto and L. Vercouter, ‘‘Tuning the discount factor in order to ence and Engineering, the 2017 IEEE International Conference on Service
reach average optimality on deterministic MDPs,’’ in Artificial Intelligence Operations and Logistics, and Informatics and the 2019 IEEE Systems, Man,
XXXV, M. Bramer and M. Petridis, Eds. Cham, Switzerland: Springer, and Cybernetics Conference.
2018, pp. 92–105.
Open Access funding provided by ‘Politecnico di Bari’ within the CRUI CARE Agreement