33,100 research outputs found
Energy Efficiency of Hybrid-Power HetNets: A Population-like Games Approach
In this paper, a distributed control scheme based on population games is proposed. The controller is in charge of dealing with the energy consumption problem in a Heterogeneous Cellular Network (HetNet) powered by hybrid energy sources (grid and renewable energy) while guaranteeing appropriate quality of service (QoS) level at the same time. Unlike the conventional approach in population games, it considers both atomicity and non-anonymity. Simulation results show that the proposed population-games approach reduces grid consumption by up to about 12% compared to the traditional best-signal level association policy.U.S. Air Force Office of Scientific Research FA9550-17-1-0259Ministerio de Cultura y Deporte DPI2016-76493-C3-3-RMinisterio de EconomĂa y Empresa DPI2017-86918-
The simplicity project: easing the burden of using complex and heterogeneous ICT devices and services
As of today, to exploit the variety of different "services", users need to configure each of their devices by using different procedures and need to explicitly select among heterogeneous access technologies and protocols. In addition to that, users are authenticated and charged by different means. The lack of implicit human computer interaction, context-awareness and standardisation places an enormous burden of complexity on the shoulders of the final users. The IST-Simplicity project aims at leveraging such problems by: i) automatically creating and customizing a user communication space; ii) adapting services to user terminal characteristics and to users preferences; iii) orchestrating network capabilities. The aim of this paper is to present the technical framework of the IST-Simplicity project. This paper is a thorough analysis and qualitative evaluation of the different technologies, standards and works presented in the literature related to the Simplicity system to be developed
POEM: Pricing Longer for Edge Computing in the Device Cloud
Multiple access mobile edge computing has been proposed as a promising
technology to bring computation services close to end users, by making good use
of edge cloud servers. In mobile device clouds (MDC), idle end devices may act
as edge servers to offer computation services for busy end devices. Most
existing auction based incentive mechanisms in MDC focus on only one round
auction without considering the time correlation. Moreover, although existing
single round auctions can also be used for multiple times, users should trade
with higher bids to get more resources in the cascading rounds of auctions,
then their budgets will run out too early to participate in the next auction,
leading to auction failures and the whole benefit may suffer. In this paper, we
formulate the computation offloading problem as a social welfare optimization
problem with given budgets of mobile devices, and consider pricing longer of
mobile devices. This problem is a multiple-choice multi-dimensional 0-1
knapsack problem, which is a NP-hard problem. We propose an auction framework
named MAFL for long-term benefits that runs a single round resource auction in
each round. Extensive simulation results show that the proposed auction
mechanism outperforms the single round by about 55.6% on the revenue on average
and MAFL outperforms existing double auction by about 68.6% in terms of the
revenue.Comment: 8 pages, 1 figure, Accepted by the 18th International Conference on
Algorithms and Architectures for Parallel Processing (ICA3PP
Web Services: Enabling Dynamic Business Networks
A Dynamic Business Network is a distinct system of participants (customers, suppliers, complimentors, competitors, service providers) that use the network to achieve customer satisfaction and profitability and where participants and relationships evolve over time. However, unpredictability and rapid change in a Dynamic Business Network creates a significant challenge in implementing and supporting business application software. Traditional information systems implementation methods require an a priori design and are built for a particular purpose for use over an extended period of time. Loosely coupled business networks change interrelationships between nodes both quickly and frequently, thus providing little or no notice for planning, implementing, or changing the supporting applications. The dynamic sourcing capabilities of the emerging Web Services framework provide a key to enabling these complex eco-systems. We explore the strategic and technological dimensions of Web Services and describe how they can be used to support dynamic business networks
Recommended from our members
A QoS monitoring system in a heterogeneous multi-domain DVB-H platform
The MobileTV, IPTV, and DVB standards (DVB-H/T) have been defined to offer mobile users interactive multimedia services with quality of service (QoS) consistency analogous to TV services. However, the market has yet to provide effective and economical solutions for the real-time delivery of such services to the corresponding transmitters over multi-domain IP networks. The monitoring system proposed in this paper enables the QoS in the IP networks involved in the delivery of real-time multimedia content to the transmitters to be ascertained. The system utilizes the QoS parameters defined in MPEG-2 Transport Streams to detect problems occurring in the heterogeneous multi-domain IP networks. The ability to detect problems having an adverse effect on QoS allows appropriate control actions to be determined to recover the QoS across the composite IP network. The design and implementation of the proposed QoS-Monitoring system (QoS-MS) is presented, followed by analysis of experimental results that demonstrate the feasibility of the system
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the
spectrum sensing data falsification (SSDF) attack in the literature, is one of
the key adversaries to the success of cognitive radio networks (CRNs). In the
past couple of years, the research on the Byzantine attack and defense
strategies has gained worldwide increasing attention. In this paper, we provide
a comprehensive survey and tutorial on the recent advances in the Byzantine
attack and defense for CSS in CRNs. Specifically, we first briefly present the
preliminaries of CSS for general readers, including signal detection
techniques, hypothesis testing, and data fusion. Second, we analyze the spear
and shield relation between Byzantine attack and defense from three aspects:
the vulnerability of CSS to attack, the obstacles in CSS to defense, and the
games between attack and defense. Then, we propose a taxonomy of the existing
Byzantine attack behaviors and elaborate on the corresponding attack
parameters, which determine where, who, how, and when to launch attacks. Next,
from the perspectives of homogeneous or heterogeneous scenarios, we classify
the existing defense algorithms, and provide an in-depth tutorial on the
state-of-the-art Byzantine defense schemes, commonly known as robust or secure
CSS in the literature. Furthermore, we highlight the unsolved research
challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral
Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection
The arm race between spambots and spambot-detectors is made of several cycles
(or generations): a new wave of spambots is created (and new spam is spread),
new spambot filters are derived and old spambots mutate (or evolve) to new
species. Recently, with the diffusion of the adversarial learning approach, a
new practice is emerging: to manipulate on purpose target samples in order to
make stronger detection models. Here, we manipulate generations of Twitter
social bots, to obtain - and study - their possible future evolutions, with the
aim of eventually deriving more effective detection techniques. In detail, we
propose and experiment with a novel genetic algorithm for the synthesis of
online accounts. The algorithm allows to create synthetic evolved versions of
current state-of-the-art social bots. Results demonstrate that synthetic bots
really escape current detection techniques. However, they give all the needed
elements to improve such techniques, making possible a proactive approach for
the design of social bot detection systems.Comment: This is the pre-final version of a paper accepted @ 11th ACM
Conference on Web Science, June 30-July 3, 2019, Boston, U
The Role of the Mangement Sciences in Research on Personalization
We present a review of research studies that deal with personalization. We synthesize current knowledge about these areas, and identify issues that we envision will be of interest to researchers working in the management sciences. We take an interdisciplinary approach that spans the areas of economics, marketing, information technology, and operations. We present an overarching framework for personalization that allows us to identify key players in the personalization process, as well as, the key stages of personalization. The framework enables us to examine the strategic role of personalization in the interactions between a firm and other key players in the firm's value system. We review extant literature in the strategic behavior of firms, and discuss opportunities for analytical and empirical research in this regard. Next, we examine how a firm can learn a customer's preferences, which is one of the key components of the personalization process. We use a utility-based approach to formalize such preference functions, and to understand how these preference functions could be learnt based on a customer's interactions with a firm. We identify well-established techniques in management sciences that can be gainfully employed in future research on personalization.CRM, Persoanlization, Marketing, e-commerce,
- âŠ