123 research outputs found
07271 Abstracts Collection -- Computational Social Systems and the Internet
From 01.07. to 06.07.2007, the Dagstuhl Seminar 07271 ``Computational Social Systems and the Internet\u27\u27 was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl.
During the seminar, several participants presented their current
research, and ongoing work and open problems were discussed. Abstracts of
the presentations given during the seminar as well as abstracts of
seminar results and ideas are put together in this paper. The first section
describes the seminar topics and goals in general.
Links to extended abstracts or full papers are provided, if available
Game Theory in Communications:a Study of Two Scenarios
Multi-user communication theory typically studies the fundamental limits of communication systems, and considers communication schemes that approach or even achieve these limits. The functioning of many such schemes assumes that users always cooperate, even when it is not in their own best interest. In practice, this assumption need not be fulfilled, as rational communication participants are often only interested in maximizing their own communication experience, and may behave in an undesirable manner from the system's point of view. Thus, communication systems may operate differently than intended if the behavior of individual participants is not taken into account. In this thesis, we study how users make decisions in wireless settings, by considering their preferences and how they interact with each other. We investigate whether the outcomes of their decisions are desirable, and, if not, what can be done to improve them. In particular, we focus on two related issues. The first is the decision-making of communication users in the absence of any central authority, which we consider in the context of the Gaussian multiple access channel. The second is the pricing of wireless resources, which we consider in the context of the competition of wireless service providers for users who are not contractually tied to any provider, but free to choose the one offering the best tradeoff of parameters. In the first part of the thesis, we model the interaction of self-interested users in a Gaussian multiple access channel using non-cooperative game theory. We demonstrate that the lack of infrastructure leads to an inefficient outcome for users who interact only once, specifically due to the lack of coordination between users. Using evolutionary game theory, we show that this inefficient outcome would also arise as a result of repeated interaction of many individuals over time. On the other hand, if the users correlate their decoding schedule with the outcome of some publicly observed (pseudo) random variable, the resulting outcome is efficient. This shows that sometimes it takes very little intervention on the part of the system planner to make sure that users choose a desirable operating point. In the second part of the thesis, we consider the competition of wireless service providers for users who are free to choose their service provider based on their channel parameters and the resource price. We model this situation as a two-stage game where the providers announce unit resource prices in the first stage and the users choose how much resource they want to purchase from each provider in the second stage. Under fairly general conditions, we show that the competitive interaction of users and providers results in socially optimal resource allocation. We also provide a decentralized primal-dual algorithm and prove its convergence to the socially optimal outcome
Machine Learning
Machine Learning can be defined in various ways related to a scientific domain concerned with the design and development of theoretical and implementation tools that allow building systems with some Human Like intelligent behavior. Machine learning addresses more specifically the ability to improve automatically through experience
Recommended from our members
Blockchain based secure message dissemination in vehicular networks
Vehicular ad-hoc networks (VANETs) are one of the key elements in Intelligent Transportation System (ITS) to enable information exchange among vehicles and Roadside Units (RSUs) via vehicle-to-vehicle (V2V) and vehicle-to- nfrastructure (V2I) communications. With continuously increasing number of vehicles on road, there are numerous security and privacy challenges associated with VANETs. Communication among vehicles is needed to be secure and bandwidth efficient. Also, the messages exchanged between vehicles must be authentic so as to maintain a trusted network in a privacy-preserving manner. Furthermore, a sustainable economic model is required to incentivise honest and cooperative vehicles. Traditional security and privacy solutions in centralised networks are not applicable to VANETs due to its distributed nature, heterogeneity, high mobility and low latency requirements. Meanwhile, the new development of blockchain has been attracting significant interests due to its key features including consensus to evaluate message credibility and immutable storage in distributed ledger, which provides an alternative solution to the security and privacy challenges in VANETs.
This thesis aims to present blockchain solutions for the security and privacy of VANETs meeting the stringent requirements of low latency and bandwidth-efficient message dissemination. VANETs are simulated in OMNeT++ to validate the proposed solutions. Specifically, two novel blockchain consensus algorithms have been developed for message authentication and relay selection in presence of malicious vehicles. The first employs a voting based message validation and relay selection, which reduces the failure rate in message validation by 11% as compared to reputation based consensus. The second utilises federated learning supported by blockchain as a better privacy-preserving solution, which is 65.2% faster than the first voting based solution. Both approaches include blockchain-based incentive mechanisms and game theory analysis to observe strategic behaviour of honest and malicious vehicles. To further study the privacy aspect of vehicular networks, the integration of blockchain with physical layer security is also theoretically analysed in Vehicle-to-Everything (V2X) communications scenarios. The integration results in 8.2 Mbps increased goodput as compared to the blockchain solution alone.
In essence, our research work shows that blockchain can offer better control and security, as compared to centralised solutions, if properly adjusted according to the application and network requirements. Thus, the proposed solutions can provide guidelines for practically feasible application of blockchain in vehicular networks
Data-driven Computational Social Science: A Survey
Social science concerns issues on individuals, relationships, and the whole
society. The complexity of research topics in social science makes it the
amalgamation of multiple disciplines, such as economics, political science, and
sociology, etc. For centuries, scientists have conducted many studies to
understand the mechanisms of the society. However, due to the limitations of
traditional research methods, there exist many critical social issues to be
explored. To solve those issues, computational social science emerges due to
the rapid advancements of computation technologies and the profound studies on
social science. With the aids of the advanced research techniques, various
kinds of data from diverse areas can be acquired nowadays, and they can help us
look into social problems with a new eye. As a result, utilizing various data
to reveal issues derived from computational social science area has attracted
more and more attentions. In this paper, to the best of our knowledge, we
present a survey on data-driven computational social science for the first time
which primarily focuses on reviewing application domains involving human
dynamics. The state-of-the-art research on human dynamics is reviewed from
three aspects: individuals, relationships, and collectives. Specifically, the
research methodologies used to address research challenges in aforementioned
application domains are summarized. In addition, some important open challenges
with respect to both emerging research topics and research methods are
discussed.Comment: 28 pages, 8 figure
Cognitive-Empowered Femtocells: An Intelligent Paradigm of a Robust and Efficient Media Access
Driven by both the need for ubiquitous wireless services and the stringent strain on radio spectrum faced in today's wireless communications, cognitive radio (CR) have been investigated as a promising solution to deploy Wireless Regional Area Networks (WRANs) for an efficient spectrum utilization. Communication devices with CR capabilities are able to access spectrum bands licensed for other wireless services in an opportunistic and secondary fashion, while preventing harmful interference to incumbent licensed services. However, a lesson learned from early experiences in developing such macro-cellular networks is that it becomes increasingly less economically viable to develop CR macrocellular infrastructures for increasing data rates in both line-of-sight as well as non-line-of-sight situation of WRAN, and the corresponding quality of service (QoS) in macrocellular networks is also noticeably degraded due to path loss, shadowing, and multipath fading due to wall penetration.
Moreover, there are several challenges to make the real-world CR enabling dynamic spectrum access a difficult problem to implement without harmful interference. First, the hardware design of cognitive radio on the physical layer involves the tuning over a broad range of spectrum to detect a weak signal in a dynamic environment of fading channels, which in turn makes identification of the spectrum opportunities hard to achieve in an efficient and accurate manner. Second, opportunistic media access based on imperfect spectrum usage information obtain from physical layer brings up undesirable interference issue, as well as reliability issues introduced by mutual interference. Third, the curial issue is to determine which channels to use for data transmissions in presence of the dynamic and opportunistic nature of wireless environments, in the case where pre-defined dedicated control channel is not available in the complex and heterogenous networks.
In this dissertation, a novel framework called Cognitive-Empowered Femtocell (CEF), which combines CR techniques with femtocell networking, is introduced to tackle these challenges and achieve better spectrum reuse, lower interference, easy integration, wider network coverage, as well as fast and cost effective early stage WRAN. In this framework, a sensing coordination scheme is proposed to gracefully unshackles the master/slave relationship between central controllers and end users, while maintaining order and coordination such that better sensing precision and efficiency can be achieved. As such, the network intelligence can be expanded from controlling the intelligence paradigm to better understand the satisfy wireless user needs. We also discuss design and deployment aspects such as sensing with reasoning approach, gossip-enabled stochastic media access without a dedicated control channel, all of which are important to the success of the CEF framework.
We illustrate that such a framework allows wireless users to intelligently capture spectrum opportunities while mitigating interference to other users, as well as improving the network capacity. Performance analysis and simulations were conducted based on these techniques to provide insight on the future direction of interference suppression for dynamic spectrum access
- …