1,276 research outputs found

    SOCIAL NETWORK INFLUENCE ON RIDESHARING, DISASTER COMMUNICATIONS, AND COMMUNITY INTERACTIONS

    Get PDF
    The complex topology of real networks allows network agents to change their functional behavior. Conceptual and methodological developments in network analysis have furthered our understanding of the effects of interpersonal environment on normative social influence and social engagement. Social influence occurs when network agents change behavior being influenced by others in the social network and this takes place in a multitude of varying disciplines. The overarching goal of this thesis is to provide a holistic understanding and develop novel techniques to explore how individuals are socially influenced, both on-line and off-line, while making shared-trips, communicating risk during extreme weather, and interacting in respective communities. The notion of influence is captured by quantifying the network effects on such decision-making and characterizing how information is exchanged between network agents. The methodologies and findings presented in this thesis will benefit different stakeholders and practitioners to determine and implement targeted policies for various user groups in regular, special, and extreme events based on their social network characteristics, properties, activities, and interactions

    Automated Algorithmic Machine-to-Machine Negotiation for Lane Changes Performed by Driverless Vehicles at the Edge of the Internet of Things

    Get PDF
    This dissertation creates and examines algorithmic models for automated machine-to-machine negotiation in localized multi-agent systems at the edge of the Internet of Things. It provides an implementation of two such models for unsupervised resource allocation for the application domain of autonomous vehicle traffic as it pertains to lane changing and speed setting selection. The first part concerns negotiation via abstract argumentation. A general model for the arbitration of conflict based on abstract argumentation is outlined and then applied to a scenario where autonomous vehicles on a multi-lane highway use expert systems in consultation with private objectives to form arguments and use them to compete for lane positions. The conflict resolution component of the resulting argumentation framework is augmented with social voting to achieve a community supported conflict-free outcome. The presented model heralds a step toward independent negotiation through automated argumentation in distributed multi-agent systems. Many other cyber-physical environments embody stages for opposing positions that may benefit from this type of tool for collaboration. The second part deals with game-theoretic negotiation through mechanism design. It outlines a mechanism providing resource allocation for a fee and applies it to autonomous vehicle traffic. Vehicular agents apply for speed and lane assignments with sealed bids containing their private feasible action valuations determined within the context of their governing objective. A truth-inducing mechanism implementing an incentive-compatible strategyproof social choice functions achieves a socially optimal outcome. The model can be adapted to many application fields through the definition of a domain-appropriate operation to be used by the allocation function of the mechanism. Both presented prototypes conduct operations at the edge of the Internet of Things. They can be applied to agent networks in just about any domain where the sharing of resources is required. The social voting argumentation approach is a minimal but powerful tool facilitating the democratic process when a community makes decisions on the sharing or rationing of common-pool assets. The mechanism design model can create social welfare maximizing allocations for multiple or multidimensional resources

    Privacy-Aware and Reliable Complex Event Processing in the Internet of Things - Trust-Based and Flexible Execution of Event Processing Operators in Dynamic Distributed Environments

    Get PDF
    The Internet of Things (IoT) promises to be an enhanced platform for supporting a heterogeneous range of context-aware applications in the fields of traffic monitoring, healthcare, and home automation, to name a few. The essence of the IoT is in the inter-networking of distributed information sources and the analysis of their data to understand the interactions between the physical objects, their users, and their environment. Complex Event Processing (CEP) is a cogent paradigm to infer higher-level information from atomic event streams (e.g., sensor data in the IoT). Using functional computing modules called operators (e.g., filters, aggregates, sequencers), CEP provides for an efficient and low-latency processing environment. Privacy and mobility support for context processing is gaining immense importance in the age of the IoT. However, new mobile communication paradigms - like Device-to-Device (D2D) communication - that are inherent to the IoT, must be enhanced to support a privacy-aware and reliable execution of CEP operators on mobile devices. It is crucial to preserve the differing privacy constraints of mobile users, while allowing for flexible and collaborative processing. Distributed mobile environments are also susceptible to adversary attacks, given the lack of sufficient control over the processing environment. Lastly, ensuring reliable and accurate CEP becomes a serious challenge due to the resource-constrained and dynamic nature of the IoT. In this thesis, we design and implement a privacy-aware and reliable CEP system that supports distributed processing of context data, by flexibly adapting to the dynamic conditions of a D2D environment. To this end, the main contributions, which form the key components of the proposed system, are three-fold: 1) We develop a method to analyze the communication characteristics of the users and derive the type and strength of their relationships. By doing so, we utilize the behavioral aspects of user relationships to automatically derive differing privacy constraints of the individual users. 2) We employ the derived privacy constraints as trust relations between users to execute CEP operators on mobile devices in a privacy-aware manner. In turn, we develop a trust management model called TrustCEP that incorporates a robust trust recommendation scheme to prevent adversary attacks and allow for trust evolution. 3) Finally, to account for reliability, we propose FlexCEP, a fine-grained flexible approach for CEP operator migration, such that the CEP system adapts to the dynamic nature of the environment. By extracting intermediate operator state and by leveraging device mobility and instantaneous characteristics, FlexCEP provides a flexible CEP execution model under varying network conditions. Overall, with the help of thorough evaluations of the above three contributions, we show how the proposed distributed CEP system can satisfy the requirements established above for a privacy-aware and reliable IoT environment

    Adaptation strategies for self-organising electronic institutions

    No full text
    For large-scale systems and networks embedded in highly dynamic, volatile, and unpredictable environments, self-adaptive and self-organising (SASO) algorithms have been proposed as solutions to the problems introduced by this dynamism, volatility, and unpredictability. In open systems it cannot be guaranteed that an adaptive mechanism that works well in isolation will work well — or at all — in combination with others. In complexity science the emergence of systemic, or macro-level, properties from individual, or micro-level, interactions is addressed through mathematical modelling and simulation. Intermediate meso-level structuration has been proposed as a method for controlling the macro-level system outcomes, through the study of how the application of certain policies, or norms, can affect adaptation and organisation at various levels of the system. In this context, this thesis describes the specification and implementation of an adaptive affective anticipatory agent model for the individual micro level, and a self-organising distributed institutional consensus algorithm for the group meso level. Situated in an intelligent transportation system, the agent model represents an adaptive decision-making system for safe driving, and the consensus algorithm allows the vehicles to self-organise agreement on values necessary for the maintenance of “platoons” of vehicles travelling down a motorway. Experiments were performed using each mechanism in isolation to demonstrate its effectiveness. A computational testbed has been built on a multi-agent simulator to examine the interaction between the two given adaptation mechanisms. Experiments involving various differing combinations of the mechanisms are performed, and the effect of these combinations on the macro-level system properties is measured. Both beneficial and pernicious interactions are observed; the experimental results are analysed in an attempt to understand these interactions. The analysis is performed through a formalism which enables the causes for the various interactions to be understood. The formalism takes into account the methods by which the SASO mechanisms are composed, at what level of the system they operate, on which parts of the system they operate, and how they interact with the population of the system. It is suggested that this formalism could serve as the starting point for an analytic method and experimental tools for a future systems theory of adaptation.Open Acces

    Code offloading in opportunistic computing

    Get PDF
    With the advent of cloud computing, applications are no longer tied to a single device, but they can be migrated to a high-performance machine located in a distant data center. The key advantage is the enhancement of performance and consequently, the users experience. This activity is commonly referred computational offloading and it has been strenuously investigated in the past years. The natural candidate for computational offloading is the cloud, but recent results point out the hidden costs of cloud reliance in terms of latency and energy; Cuervo et. al. illustrates the limitations on cloud-based computational offloading based on WANs latency times. The dissertation confirms the results of Cuervo et. al. and illustrates more use cases where the cloud may not be the right choice. This dissertation addresses the following question: is it possible to build a novel approach for offloading the computation that overcomes the limitations of the state-of-the-art? In other words, is it possible to create a computational offloading solution that is able to use local resources when the Cloud is not usable, and remove the strong bond with the local infrastructure? To this extent, I propose a novel paradigm for computation offloading named anyrun computing, whose goal is to use any piece of higher-end hardware (locally or remotely accessible) to offloading a portion of the application. With anyrun computing I removed the boundaries that tie the solution to an infrastructure by adding locally available devices to augment the chances to succeed in offloading. To achieve the goals of the dissertation it is fundamental to have a clear view of all the steps that take part in the offloading process. To this extent, I firstly provided a categorization of such activities combined with their interactions and assessed the impact on the system. The outcome of the analysis is the mapping to the problem to a combinatorial optimization problem that is notoriously known to be NP-Hard. There are a set of well-known approaches to solving such kind of problems, but in this scenario, they cannot be used because they require a global view that can be only maintained by a centralized infrastructure. Thus, local solutions are needed. Moving further, to empirically tackle the anyrun computing paradigm, I propose the anyrun computing framework (ARC), a novel software framework whose objective is to decide whether to offload or not to any resource-rich device willing to lend assistance is advantageous compared to local execution with respect to a rich array of performance dimensions. The core of ARC is the nference nodel which receives a rich set of information about the available remote devices from the SCAMPI opportunistic computing framework developed within the European project SCAMPI, and employs the information to profile a given device, in other words, it decides whether offloading is advantageous compared to local execution, i.e. whether it can reduce the local footprint compared to local execution in the dimensions of interest (CPU and RAM usage, execution time, and energy consumption). To empirically evaluate ARC I presented a set of experimental results on the cloud, cloudlet, and opportunistic domain. In the cloud domain, I used the state of the art in cloud solutions over a set of significant benchmark problems and with three WANs access technologies (i.e. 3G, 4G, and high-speed WAN). The main outcome is that the cloud is an appealing solution for a wide variety of problems, but there is a set of circumstances where the cloud performs poorly. Moreover, I have empirically shown the limitations of cloud-based approaches, specifically, In some circumstances, problems with high transmission costs tend to perform poorly, unless they have high computational needs. The second part of the evaluation is done in opportunistic/cloudlet scenarios where I used my custom-made testbed to compare ARC and MAUI, the state of the art in computation offloading. To this extent, I have performed two distinct experiments: the first with a cloudlet environment and the second with an opportunistic environment. The key outcome is that ARC virtually matches the performances of MAUI (in terms of energy savings) in cloudlet environment, but it improves them by a 50% to 60% in the opportunistic domain
    corecore