7 research outputs found
Attention-aware Resource Allocation and QoE Analysis for Metaverse xURLLC Services
Metaverse encapsulates our expectations of the next-generation Internet,
while bringing new key performance indicators (KPIs). Although conventional
ultra-reliable and low-latency communications (URLLC) can satisfy objective
KPIs, it is difficult to provide a personalized immersive experience that is a
distinctive feature of the Metaverse. Since the quality of experience (QoE) can
be regarded as a comprehensive KPI, the URLLC is evolved towards the next
generation URLLC (xURLLC) with a personalized resource allocation scheme to
achieve higher QoE. To deploy Metaverse xURLLC services, we study the
interaction between the Metaverse service provider (MSP) and the network
infrastructure provider (InP), and provide an optimal contract design
framework. Specifically, the utility of the MSP, defined as a function of
Metaverse users' QoE, is to be maximized, while ensuring the incentives of the
InP. To model the QoE mathematically, we propose a novel metric named
Meta-Immersion that incorporates both the objective KPIs and subjective
feelings of Metaverse users. Furthermore, we develop an attention-aware
rendering capacity allocation scheme to improve QoE in xURLLC. Using a
user-object-attention level dataset, we validate that the xURLLC can achieve an
average of 20.1% QoE improvement compared to the conventional URLLC with a
uniform resource allocation scheme
AI-Generated Incentive Mechanism and Full-Duplex Semantic Communications for Information Sharing
The next generation of Internet services, such as Metaverse, rely on mixed
reality (MR) technology to provide immersive user experiences. However, the
limited computation power of MR headset-mounted devices (HMDs) hinders the
deployment of such services. Therefore, we propose an efficient information
sharing scheme based on full-duplex device-to-device (D2D) semantic
communications to address this issue. Our approach enables users to avoid heavy
and repetitive computational tasks, such as artificial intelligence-generated
content (AIGC) in the view images of all MR users. Specifically, a user can
transmit the generated content and semantic information extracted from their
view image to nearby users, who can then use this information to obtain the
spatial matching of computation results under their view images. We analyze the
performance of full-duplex D2D communications, including the achievable rate
and bit error probability, by using generalized small-scale fading models. To
facilitate semantic information sharing among users, we design a contract
theoretic AI-generated incentive mechanism. The proposed diffusion model
generates the optimal contract design, outperforming two deep reinforcement
learning algorithms, i.e., proximal policy optimization and soft actor-critic
algorithms. Our numerical analysis experiment proves the effectiveness of our
proposed methods. The code for this paper is available at
https://github.com/HongyangDu/SemSharingComment: Accepted by IEEE JSA
Enhancement of the Contract Negotiation Process In Agency Relationships in IT Outsourcing: A model for improving contract negotiations and the emergence of trust between principals and agents in IT outsourcing agency relationships
The research aims at establishing an understanding of the influencing factors and
their enhancement through a contract enhancement model (CEM) in order to ensure
an improved course of contract negotiations between principals and agents in
agency relationships in IT outsourcing. The research discusses the phenomenon of
hidden actions and their occurrences, challenges and solutions as explained in the
agency theory (JENSEN/MECKLING, 1976). The CEM helps to ensure that the
phenomenon of hidden actions as well as opportunistic behaviour are reduced and
maximation of benefit is given and shared between the parties. To guarantee a
better understanding, the research sets the theoretical facts of the agency theory in
conjunction with facts of other theories, such as economics and social cognitive
science, in order to manifest the content of the CEM and to ensure that the
theoretical framework of the research is based on solid grounds. The research
contributes to theory and practice. It provides an enhanced approach for solving
challenges arising from hidden actions. With the help of the CEM, the research
instructs and guides interacting parties in agency relationships in IT outsourcing how
to increase the speed, the efficiency and the effectiveness of their contract
negotiations to enable them to develop a solid foundation for a long-lasting business
relationship, from the very beginning. Previous research has been conducted in the
field of enhancing relationships between principals and agents, but such research
has focused on enhancing communication and knowledge transfer between the
parties (Henrich, 2011). The present research is understood as a continuation of
this previous research. As mentioned above, it aims at enhancing contract
negotiations by making them more efficient and speeding them up to help principals
and agents in agency relationships in IT outsourcing to run through the process of
contract negotiations more effectively. Besides focusing on agency theory, the
research also draws on literature in the field of outsourcing, trust and information
exchange. In the past, various studies have shown that many outsourcing projects
have failed to run for a prolonged period or have been interrupted, renegotiated or
even terminated (Leimeister, 2010, p. 2). The literature shows that generally research
has already contributed to this subject with a wide range of theories about the
constitution and characterisation of mutual exchange between organisations
(Kuhlmann, 2012, p. 3).
Solving the conflict of information asymmetry as described in the agency theory will
lead to an increase of total well-being and should be the aspired solution from a
utilitarian point of view (Zaggl, 2012, p. 7). Information exchange and trust as further
research subjects within this research are interlinked with the behaviour of
individuals who are themselves causing an impact on the level of quality of the
relationship. A well-functioning exchange of information can reduce costs for
information sharing and the involved parties are willing to to share and exchange
information more voluntarily if they recognise that information exchange generates
a benefit for both parties (Porterfield, 2007, p. 32). Trust on the other hand has the
potential to enhance the relationship between principals and agents. Trust is an
informal mechanism which often leads to coordinated joint efforts that improve
outcomes and help to exceed expectations of what the interacting parties might
achieve, acting solely in their own interest (Hoejmose, Brammer & Milington, 2012,
p. 616). By enhancing the influencing factors which are understood to be
responsible for poor development of trust and a low level of information exchange
between the parties in IT outsourcing, the research provides an opportunity to
improve the current situation between the interacting individuals in a situation in
which both parties are willing to cooperate which each other. The methodological
ground for the research is a constructivist approach. The author understands
constructivism as an underlying aspect for developing and discussing ideas, norms
and identities. This fits in well with the aim of the research. The analysis of the data
collection is reflected in the theoretical standards of the grounded theory (GT). Steps
such as identifying the substantive research area, collecting data pertaining to the
substantive area and using open coding while collecting the data until the core
strategy is recognised or selected, have been conducted to allow proper exposure
of information and knowledge. Coding has been seen as a first step of data analysis
to move away from particular statements to more abstract interpretations of the
interview data.
In addition to this, a qualitative content analysis according to Mayring alongside with
conducting semi-structured expert interviews as a facilitator for collecting the
respective data has been conducted. The central idea of the qualitative content
analysis approach is to conceptualise the process of assigning categories to text
passages as a qualitative interpretive act, but following content-analytical rules to
align research interest with general defined behavioural rules for research work. To
guarantee a stringent course of the research, text passages of the interviews have
been coded and categorised to describe patterns which emerge from the data
analysis. To ensure authenticity, data interpretation has been reviewed constantly
against the original interview transcripts. Expert interviews ensure that the
knowledge of the experts in agency relationships in IT outsourcing can be retrieved
and thus this approach represents a systematic basis for data analysis. The
classification is based on the possibility of reconstructing identifiable and
interpretable statements made by the experts (Neuser & Nagel, 2002, p. 32). They
include the goal of ensuring a generation of area-specific and object-related
statements. The experts have been selected according to their function and position
within the participating firms (Scholl, 2003, p. 4). The interviews are based on a
guide with formulated open questions that are based on the respective interview.
The use of an interview guide increases the comparability of data and also ensures
that the collected data will sustain a structure (Gläder & Laudel, 2006, p. 42). The
interviewer’s influence on the content is regulated and controlled by the interview
guide. The interview guide has been tested iteratively prior to conducting the
interviews to minimise unclear content and to eliminate obstructions. The interviews
have been audio recorded and transcribed afterwards. The interviews have been
used only for research purposes. All content has been treated anonymously and is
kept confidential. All information has been stored securely and deleted when no
longer required for research purposes. Participation was voluntary and interviewees
have been informed that interviews are conducted as part of a DBA research.
Interviewees had the right to withdraw from an interview at any time. Interviews have
been conducted until data saturation had been reached. The implemented content
analysis is seen as a descriptive method. Disadvantages of the form of analysis may
be that data can be insensitive and might not differentiate between meanings.
On the one hand, results could be skewed or slanted if the words and their meanings
are misinterpreted. On the other hand, the content analysis provides the benefit that
it is unobtrusive. Once data is collected and analysed appropriately, data can be
corroborated by other researchers making the data reproducible. Therefore, content
analysis is understood to be the best choice as a research technique for making
inferences by systematically and objectively identifying specified characteristics
within the text of the present thesis. Hypotheses have been verified or falsified by
the help of pre-defined, measurable values. Data analysis was conducted according
to these values to guarantee objectiveness and robustness. To strengthen the CEM
and its related content it is considered to prove the validity and the robustness of
the CEM by introducing the CEM to a set amount of external persons. They test,
review, use and adapt the CEM in practice to obtain more congruency with the
theoretical foundation to be able to close the loop between theory and practice. A
result of this is that subsequently documents can be analysed and therefore a
documentary analysis can manifest the CEM and its theoretical foundation. This will
guarantee that the CEM and its theoretical framework can be determined as
feasible, practicable and robust in its content. Furthermore, this might ensure that
bias and ethics are balanced out to a maximum and personal influence is kept to a
minimum. The examination of interdependencies in hidden action behaviour in
conjunction with a discussion of the aspects of theoretical evidence on contract
negotiation, information exchange and trust shows that an enhancement of these
influencing factors contributes to a significantly improved contract negotiation
process and information exchange. The independent variables which will be
discussed in the present thesis affect the development of interpersonal connections,
the information exchange and the development of trust as a trigger for willingness
for transparency and openness as well as for trust as the foundation of improving
the contract negotiation process in a highly positive way. In particular, trust
contributes to reducing hidden actions as well as it increases the feeling of being
and acting securely and according to processes and pre-defined agreements. This
shows that trust influences hidden actions positively which itself has its source in
insecure situations or in one-sided maximisation of each party's own tendency to
increase its own well-being. Moreover, the feeling of having security can be
understood as a requirement for achieving stability in the respective agency
relationship.
Nonetheless, trust can be held accountable for providing a feeling of stability and
security, and thus leads to a better information exchange between the parties.
Based on this assumption it can be stated that due to a better mutual acceptance
between the parties caused by jointly pre-defined content and rules, information is
shared more easily. This influences the information exchange and as a
consequence the development of trust. The improvement of information exchange
assesses existing information asymmetries and overcomes these with the effect of
minimising the appeal of hidden actions. From the results of the data generation and
analysis, guidance as well as a profound perspective for interacting individuals in
agency relationships in IT outsourcing can be derived. This provides the grounds
for suggestions on improving existing relationships and bringing in emergent
relationships efficiently from the beginning. Furthermore, this situation as such
creates a foundation for long-term cooperations. This guidance, as a result of the
contract negotiation model and its related content, represents the analysis and the
improvement of previously unconsidered subject fields and theoretical areas. The
results of the examination deliver an approach as well as a good basis for further
research, as the theoretical framework together with the empirical examination in
principle outlines the dimensions, in which the contract enhancement model can
work. However, it needs to be considered that the discussed and developed contract
enhancement model needs to be adapted towards the requirements of other
business areas when regarded to be used in such business areas. This thesis
delivers substantiated data for the research field in which the research was
undertaken. With regard to the course of the survey, the evaluation of it makes
profound data available, from which further research projects could have a robust
starting point
Contract Theory Framework for Wireless Networking
With the rapid development of the modern communication networks, the problem we need to solve is no longer a pure engineering issue. In various heterogeneous network scenarios, there are service providers in need of performing economic analysis on how to ensure third parties' cooperation or attract end-users. In the other way round, third parties or end-users need to evaluate the economic benefits of cooperating or using the services from different service providers. Overall, the current wireless networks are facing a problem in which there is a tight coupling of industry-specific technologies and non-technology related network externality.
Contract theory, the 2014 Nobel Prize of economic science, has been widely used in industries, from banking to telecommunications. Particularly, contract theory is an efficient tool in dealing with asymmetric information between employer/seller(s) and employee/buyer(s) by introducing cooperation. In wireless networks, the employer/seller(s) and employee/buyer(s) can be of different roles depending on the scenario under consideration. Thus, there is a great potential to utilize the ideas, methods, and models of contract theory to design efficient wireless network mechanisms.
Given this background, this dissertation provides a theoretical research between wireless communications, networking, and economics. Especially, different contract theory models have been applied in various wireless networks scenarios. The main contribution of this dissertation are as follows.
An overview of basic concepts, classifications, and models of contract theory is provided. Furthermore, comparisons with existing economics methods in wireless networks are conducted.
Applications of contract theory for wireless networks are studied. Specially, three contract theory problems: adverse selection, moral hazard, and a mixed of the two, are applied into device-to-device (D2D) communication, mobile crowdsourcing, cognitive radio network, respectively.
Numerical results are provided to show that contract theory can be utilized for developing effective mechanisms for emerging wireless network scenarios such as traffic offloading, mobile crowdsourcing, as well as spectrum trading.
The potential and challenges of contract theory as a tool for designing mechanisms in future wireless networks are discussed.
This dissertation provides a theoretical research between wireless communications, networking, and economics, in which different contract theory models have been applied in various wireless networks scenarios. This work places a fundamental research on network economics, especially with the framework of contract theory. This research has the potential to contribute to the future of wireless networks network economics area, and have a long term effect on problems such as incentive mechanism and pricing schemes design, resource sharing and trading.Electrical and Computer Engineering, Department o