Towards Truthful Auction Mechanisms for Task Assignment in Mobile Device Clouds
|
|
- Norma Nicholson
- 6 years ago
- Views:
Transcription
1 Towards Truthful Auction Mechanisms for Task Assignment in Mobile Device Clouds Xiumin Wang, Xiaoming Chen, Weiwei Wu School of Computer and Information, Hefei University of Technology, Hefei, China College of Information Science and Electronic Engineering, Zhejiang University, China School of Computer Science and Engineering, Southeast University, Nanjing, China chen Corresponding author: Weiwei Wu, Abstract Despite the increased capabilities of mobile devices, resource-demanded mobile applications still transc what can be accomplished on a single device. As such, mobile device cloud (MDC, an environment that enables computation-intensive tasks to be performed among a set of nearby mobile devices, offers a promising architecture to support real-time mobile applications. To stimulate mobile devices to execute tasks for others, it is essential to design an incentive mechanism that appropriately charges the owners of the tasks, acted as the buyers, and rewards the mobile devices, acted as the sellers. In this paper, we propose two truthful auction mechanisms for two different task models, heterogeneous and homogeneous task models, which assume the different and the same resource requirements of the tasks, respectively. Specifically, for heterogeneous task model, we propose an efficient heuristic winning bids determination algorithm to allocate the tasks, and decide the payment of each seller for its winning bids. For homogeneous task model, we design an optimal winning bid determination algorithm, and propose a Vickrey- Clarke-Groves (VCG based auction mechanism to determine the payment of each bid. Both theoretical analysis and simulations show that the proposed auction mechanisms achieve several desirable properties such as individual rationality, truthfulness and computational efficiency. I. INTRODUCTION In recent years, mobile devices including smart phones have become ubiquitous in people s daily life, whereas they are still seriously constrained by their limited battery capacities and computation capabilities [1] [3]. Various application tasks, such as face recognition and natural language processing, exceed the limits of mobile devices. To solve this issue, one may offload their complex or resource-demanded tasks to remote cloud [4] [6]. However, this may suffer large internet latency and energy consumption, due to long communication distance. Fortunately, recent work shows that computational offloading can also be performed among a set of mobile devices forming what we called Mobile Device Clouds (MDCs [7], [8]. Generally, utilizing the unused resources of the nearby mobile devices in MDCs can achieve better system performance, e.g., reducing the latency and network congestion with short-range communications [9] [13]. Nevertheless, it is non-trivial to ask mobile devices to share their resources or execute tasks for others, as these may also incur extra cost to themselves, such as battery outage. In the literature, several works have been done to motivate mobile devices to provide their resources in mobile cloud platform [12] [16]. For example, [12] imposes a bill backlog on each mobile device. Once a device s bill backlog exceeds a threshold, it will be unable to get services from others. Although the fairness of mobile devices can be well achieved, it might not appeal to many mobile devices, as the mobile devices are always forced to provide services. The work in [13] also discusses the possible incentive schemes that can be designed in MDCs. However, it only considers the cost of the waiting time and cellular payment during task allocation, while omitting the practical resource requirement of tasks. [14] constructs a Stackelberg game model to investigate the interaction between the tasks and the mobile devices that can participate in task execution. The Stackelberg equilibrium is also achieved by appropriately determining the price charged to each task and the amount of tasks that each mobile device can work on. Nevertheless, this approach does not capture the preference of task execution. It is noted that tasks executed on different mobile devices may get different performances including completion time, communication latency, etc. Under such a circumstance, different mobile devices should get heterogeneous payments for task executions. Auction [17], a popular trading form that can efficiently allocate resources of sellers to buyers at competitive prices, has been widely used as one of the most popular incentive schemes in many areas. By viewing the resource trading system as an ecosystem, the auction mechanism can appropriately address the conflicts between the buyer s and seller s interests, the internal competitions among themselves, and guarantee the truthfulness of the submitted information. Based on this, [15], [16] design two auction mechanisms for cloudlet resource sharing in mobile cloud computing. However, these works assume the homogeneous resource requirement of the tasks. Moreover, [15], [16] limit the auction mechanism in a one-toone matching manner, which omits the fact that the resourcerich devices can support the resource requirements of multiple buyers in a practical system. Task allocation in MDCs also involves a resource trading between the owners of the tasks and the mobile devices in the system. In this paper, we aim to design an efficient auction mechanism to solve the task
2 assignment problem in MDCs, by considering a more practical model for resource requirements of the tasks and the resource availability of mobile devices. Auction mechanisms in other areas have also been studied in the literature [18] [23]. Specifically, Vickrey-Clarke-Groves (VCG auction [18], [19] requires that the optimal allocation of the resources must be guaranteed, otherwise, the truthfulness cannot be achieved. [2] designs an auction mechanism for crowdsourcing. However, it assumes that each mobile device holds a set of predefined services, and if one of the bids submitted by a mobile device wins the auction, all its predefined services are traded, even if some of them are useless to the tasks. Moreover, it does not consider the resource requirements of task executions. In a similar way, [21] proposes a location-aware auction mechanism when assigning tasks in crowdsourcing. A dynamic auction mechanism is proposed in [22], which captures the mobile users mobility patterns through a sequence of correlated auctions. Nevertheless, most of the previous works omit the resource requirements of the tasks and the resource availabilities at mobile devices, which is quite important due to the resource scarcity of mobile devices in MDCs. Compared with the existing works, the auction problem considered in this paper mainly has the following three differences: (1 the mobile tasks may require different amount of resources for executions; (2 the number of tasks that can be executed at each mobile device is not a fixed value, deping on its resource availability and the resource requirements of the tasks allocated to it; (3 mobile device may have different preferences to the tasks allocated to it, because of different computation complexities etc. To capture the interaction between the owners of the tasks and the mobile devices participating in the system, we aim to design an efficient auction mechanism for task allocation in MDCs, where the tasks (or saying the owners of the tasks act as the buyers of mobile resources, and the mobile devices owning the resources act as the sellers. In the rest of the paper, we use the terminology of buyers and tasks, sellers and mobile devices, interchangeably. Specifically, we consider two task models, heterogeneous and homogeneous task models, respectively. In heterogeneous task model, each task is assumed to require different amounts of resources for execution, while homogeneous task model assumes the same amount of resource requirement for each task. The main contributions of this paper can be summarized as follows. For heterogeneous task model, we design an efficient auction mechanism to allocate the tasks and determine the payment. We prove that the proposed auction mechanism achieves certain properties, such as computational efficiency, individual rationality, and truthfulness. For homogeneous task model, we convert the task allocation problem into finding a minimum weight bipartite matching in an auxiliary bipartite graph. Based on that, we design an optimal auction mechanism based on VCG auction. Theoretical results also show the computational efficiency, individual rationality, and truthfulness of the scheme. We validate the desirable properties of the proposed auction mechanisms through simulations. The rest of the paper is organized as follows. Section II describes the system model and problem formulation. The auction mechanisms for heterogeneous and homogeneous task models are designed in Section III and Section IV, respectively. Section V presents the simulation results. Finally, we conclude the paper in Section VI. II. PROBLEM FORMULATION In this section, we first introduce the auction model. Then, we formulate the problem and present the desirable properties of the auction. A. Auction Model We consider a set of m indivisible tasks in T = {t 1, t 2,, t m } to be allocated to mobile devices in MDCs for executions. Without loss of generality, assume that running each task requires a certain amount of resources, e.g., CPU, memory, battery etc. Let r j be the amount of resources required for task t j. Suppose that D = {d 1, d 2,, d n } is the set of mobile devices in MDC that are willing to participate in task execution. Each mobile device d i submits its bids for the tasks, B i = {b i,1, b i,2,, b i,m }, where bid b i,j B i denotes the cost claimed by d i for executing task t j. To ease presentation, we use B = n i=1 B i to denote the set of all the bids submitted by the sellers in D. It is noted that, the bids to different tasks may not be the same, even from the same mobile device. This is reasonable, as different tasks may consume different batteries or completion time on mobile devices. Moreover, as each mobile device is also with limited resources, we use R i to denote the maximum amount of resources that can be provided by d i. As mentioned above, in our auction model, the tasks requiring the resources for executions act as the buyers, while the mobile devices owning the resources act as the sellers. To assist the matching between the buyers and sellers, a trusted third party auctioneer is necessary to administrate the trading. The detail of the auction process is described as follow. The auctioneer collects the tasks to be executed, including the information of the resource requirements of the tasks. Then, it initiates the auction to the sellers in D. Each seller in D privately submits its bids and the resource availability information to the auctioneer. Based on the bids and resource requirement/availability information, the auctioneer follows a predefined auction mechanism to determine the set of winning bids and the corresponding payments of the sellers. To ease presentation, we define the following variants: { 1, if di wins its bid for task t j ; x i,j =, otherwise. (1 p i,j : the final payment offered to d i for bid b i,j. (2
3 B. Problem Formulation Due to the distributed nature of mobile devices, the real execution cost of each task is generally private and unknown to others. In this case, some selfish mobile devices may manipulate the claimed cost to gain higher utility. To differentiate from the submitted bid, we use c i,j to denote the true cost of device d i for executing task t j. Then, for each device d i D, we can define its utility as follows: u i = (p i,j x i,j c i,j, d i D, (3 which is the net revenue earned at device d i by executing tasks for others. Firstly, the auctioneer needs to determine the winning bids and allocate the tasks to the corresponding mobile devices. Such winning bids determination problem can be formulated as follows. n min x i,j b i,j, (4 subject to i=1 x i,j r j R i, d i D, (5 n x i,j = 1, t j T. (6 i=1 In the above formulation, the objective is to minimize the sum of the claimed costs for executing tasks at mobile devices. The constraint in Eq. (5 limits that the overall amount of resources required by the tasks allocated to d i is no more than R i. The constraint in Eq. (6 denotes that each task must be allocated to one and exactly one mobile device. Secondly, based on the selected winning bids, the auctioneer further decides the final trading payment of the seller for each of its winning bid. It is noted that, seller d i is willing to make trade with t j for its bid b i,j, only if the payment is no less than its claimed cost b i,j. That is, p i,j b i,j. The goal of our work is to design a truthful auction mechanism that solves the above two problems. The designed mechanism should achieve the following properties. Individual rationality: it means the utility of each mobile device should be nonnegative, i.e., u i for d i D, which is a basic condition to stimulate the mobile devices participating in task execution. Computational efficiency: The algorithm should be solved in polynomial time, which is important to a practical system. Truthfulness: The bid submitted by each mobile device should be truthful, i.e., b i,j = c i,j where c i,j is the true cost of executing task t j at device d i. In the following sections, we aim to design truthful auction mechanisms by considering two different task models, heterogeneous and homogeneous task models, respectively. In heterogeneous task model, the tasks in T may require different amounts of resources. As such, the winning bids determination problem defined in Eq. (4 is NP-hard, by a polynomial-time reduction from Multiple Knapsack problem [24], a well-known NP-hard problem. For homogeneous task model, where the tasks require the same amount of resources, we will show in Section IV that the winning bids determination problem can be converted into finding a minimum weight matching in an auxiliary bipartite graph, which can be optimally solved in polynomial time. III. TRUTHFUL ACTION MECHANISM FOR HETEROGENEOUS TASK MODEL We now consider the heterogeneous task model, where the tasks require different amounts of resources. In this case, the winning bids determination problem is a NP-hard problem, and finding the optimal solution is with high complexity. Hence, we instead design a greedy algorithm which obtains a suboptimal solution with low computational complexity. Then, we propose a payment scheme to determine the payoff of each bid. Finally, we analyze the properties of the proposed mechanism. A. Greedy Winning Bids Determination Scheme For each bid submitted by the mobile devices, e.g., b i,j, we first define a parameter β i,j, named cost per unit resource, as follows: β i,j = b i,j r j. (7 In general, the bid with smaller cost per unit resource should have higher chance to win the bid. Hence, based on this parameter, we design a greedy algorithm to solve the winning bid determination problem. The greedy rule is to pick the next most unit-cost-efficient bid as the winning bid to allocate the task, until all the tasks are assigned. Specifically, we define T as the set of the tasks that have been assigned with mobile devices so far, and B as the set of the bids that can still be chosen as the winning bids so far. Initially, we have T =, B = m i=1 B i and x i,j =. Then, in each step, we conduct the following procedure. Select the bid, e.g., b i1,j 1, with the least cost per unit resource among the bids in B. That is, β i1,j 1 = min{β i,j b i,j B}. Add b i1,j 1 as one of the winning bids, i.e., x i1,j 1 = 1, and allocate the task t j1 to mobile device d i1, i.e., T = T {t i1 }. Correspondingly, remove bid β i1,j 1 from B. We then remove the bids that may violate the resource constraint of the device, or the bids that are useless for future task allocations. That is, remove the bid b i,j from T, if b i,j satisfies any of the following two conditions: Task t j has already been allocated with mobile device in the previous steps, i.e., n i=1 x i,j = 1. As such, the bids to task t j become useless, and should be removed.
4 Algorithm 1: Winning bids determination begin T =, B = B; x i,j =, for i, j; Calculate β i,j for each bid b i,j B; while T T do Choose the bid with the least cost per unit resource from B, denoted as b i1,j 1 ; Set b i1,j 1 as one of the winning bids, i.e., x i1,j 1 = 1; Remove b i1,j 1 from B; for b i,j B do Remove b i,j from B, if j = j 1 ; for d i D do Remove each bid b i,j from B, if R i m xi,jrj min {r j t j T T The resource left at device d i is not enough to support any other task in T T. That is, { R i x i,j r j min r j t j T T }. (8 Under such a circumstance, d i is unable to accept any new winning bid. Continue the above process, until all the tasks are allocated with mobile devices, i.e., T = T. The detail of the above process is presented in Algorithm 1. B. Payment Strategy Based on the winning bids determined in the above subsection, we then introduce how to decide the payment of each mobile device/seller for its winning bids. The payment should be such determined that each seller will honestly reports its real cost. It is noted that the bid that loses in the above subsection, will be paid by, i.e., p i,j = if x i,j =. The main idea of our payment scheme is to decide the payments of the winning bids one by one. Without loss of generality, we use B w as the set of winning bids selected in the above subsection, i.e., B w = {b i,j x i,j = 1}. The payment of winning bid b i,j B w is then decided as follows: Remove bid b i,j from the consideration bids in B. That is, B = m i=1 B i {b i,j }. Re-select the winning bids from set B as in Algorithm 1, until the task t j is allocated with a mobile device, e.g., d i. That is, the bid b i,j wins its bid for task t j without the presence of bid b i,j. We then set the payment for device d i s winning bid b i,j determined in Algorithm 1, as b i,j (i.e., the bid sent by device d i. The detail of deciding the payment for winning bid b i,j is presented in Algorithm 2. We continue the above process, until considering all the winning bids in B w. } ; Algorithm 2: The payment for winning bid b i,j begin T =, B = B\{b i,j }; x i,j =, for b i,j B; Calculate β i,j for b i,j B; while b i,j B x i,j < 1 do Choose the bid with the least cost per unit resource from B, denoted as b i1,j 1 ; Set b i1,j 1 as one of the alternative winning bids, i.e., x i 1,j 1 = 1; Remove b i1,j 1 from B; Remove all the conflicting bids as in Algorithm 1; Set p i,j = b i,j for winning bid b i,j, where x i,j = 1; Fig. 1. r 1 =2 r 2 =2 r 3 =3 r 4 =4 t d 1 t t 3 t 4 d 2 d 3 R 1 =6 R 2 =4 R 3 =5 An example to illustrate the winning bids determination process To illustrate the above process, we use Fig. 1 as an example. We assume that four tasks t 1, t 2, t 3, t 4 are to be allocated to mobile devices d 1, d 2, d 3. The amount of resources required by each task or available at each device is given near each vertex. The edge between task t j and device d i denotes the value of the bid b i,j. According to Algorithm 1, four bids b 3,1, b 3,3, b 1,4, b 2,2 will be selected as the winning bids. Furthermore, with Algorithm 2, the alternative winning bids for b 3,1, b 3,3, b 1,4, b 2,2 are b 1,1, b 2,3, b 2,4, b 1,2 respectively. Hence, tasks 1, 2, 3, 4 are allocated to devices 3, 2, 3, 1 with payments 2, 3, 3, 5 respectively. C. Theoretical Analysis We now analyze the properties of the proposed mechanism, including individual rationality, truthfulness, and computational efficiency. Lemma 1 The proposed auction mechanism achieves the individual rationality for each mobile device. Proof: Firstly, for a mobile device d i that has no winning bids, according to Algorithm 2, its payoff is zero, i.e., u i =. Secondly, for a mobile device d i that has winning bids, its utility can be calculated as u i = (p i,j x i,j c i,j = 3 5 b i,j B w (p i,j b i,j. (9 4
5 We then show that the utility obtained for each of its winning bids, e.g., b i,j B w, is non-negative, p i,j b i,j. When b i,j wins, its claimed cost must be smaller than its payment p i,j = b i,j, as otherwise, b i,j will win its bid instead of b i,j. Hence, for each winning bid that truthfully reports its bid, its utility must be nonnegative. We then analyze the computational efficiency as follows: Lemma 2 The proposed winning bids determination and payment schemes both have polynomial-time computational complexity. Proof: We first discuss the computation complexity of Algorithm 1. In Algorithm 1, we need to choose T winning bids. To select each winning bid, the bid with the least cost per unit resource in B must be found, and its complexity is O(mn. Furthermore, updating set B consumes at most O(mn complexity. Then, the complexity of selecting one winning bid is at most O(mn. Hence, the complexity of selecting all the winning bids for the tasks in T is O(m 2 n with Algorithm 1. We then analyze the complexity of Algorithm 2, which determines the payment for each winning bid. As presented, to obtain the payment of winning bid b i,j, Algorithm 2 needs to find an alternative bid for task t j, whose complexity is at most O(m 2 n. Then, the computation complexity of determining the payments of all the winning bids is O(m 3 n. To sum up, both Algorithm 1 and Algorithm 2 have polynomial-time complexity, which thus proves the above lemma. To demonstrate the truthfulness, we should prove that each mobile device will honestly submit all of its real costs. According to [25], the proposed mechanism is truthful if and only if it satisfies two conditions: 1 the wining bids determination algorithm is monotonic, and 2 each winning bid is paid the critical value. The definitions of monotonicity and critical value [25] are described as follows: Definition 1 Monotonicity: For each bid b i,j, if b i,j wins, then bid b i,j also wins, where b i,j = b i,j δ and δ >. Definition 2 Critical Value: For each bid b i,j, there is a critical value b i,j. Then, if the bid declares a cost that is not larger than b i,j, it must win, otherwise, it will not win. Based on above definitions, we can obtain that Lemma 3 The winning bids determination process in Algorithm 1 is monotonic. Proof: Suppose that b ik,j k is one of the winning bids determined in the k-th step with Algorithm 1. Then, there are k 1 bids won in the previous k 1 steps. Let (b i1,j 1, b i2,j 2,, b ik,j k be the list of the winning bids that have been determined in the first k steps. Assume that b ik,j k was replaced by another bid, e.g., b i k,j k, where b i,j = b i k,j k δ and δ >. According to Algorithm 1, it is easy to get that bid b i k,j k must also win in the k-th step or even earlier step. Thus, we prove that Algorithm 1 is monotonic. Lemma 4 Each winning bid is paid the critical value, with Algorithm 2. Proof: Suppose that b ik,j k wins its bid for task t jk, in the k-th step with Algorithm 1, and b i,j k is an alternative winning bid for task t jk without the presence of b ik,j k, determined with Algorithm 2. In this case, the payment of b ik,j k is set to b i,j k, i.e., p ik,j k = b i,j k. It is obvious that another bid b i,j k = p ik,j k δ, where δ >, would win, because its cost per unit resource must be lower than the cost per unit resource of bid b i,j k. On the contrary, the bid b i,j k = p ik,j k +δ, where δ >, will not win, as its cost per unit resource must be higher than that of b i,j k. Hence, we prove the above lemma. With the above analysis, we can analyze the truthfulness as follows. Theorem 1 The proposed auction mechanism is truthful. Proof: According to [25], we can easily get the theorem with Lemma 3 and Lemma 4. IV. AUCTION MECHANISM FOR HOMOGENEOUS TASK MODEL In this section, we consider the homogeneous task model, where each task is assumed to require the same amount of resources, i.e., r j = r. We first introduce an optimal winning bids determination algorithm. Then, we propose a VCG-based auction mechanism. Finally, we analyze the performance of the proposed mechanism. A. Optimal Winning Bids Determination Scheme Since the maximum amount of resources available at d i is R i, the number of tasks that d i can accept is constrained by Ri r and the overall number of tasks in T, m. In this case, the constraint in Eq. (5 becomes { x i,j min R } i r, m, d i D. (1 Then, the winning bids determination problem can be transformed into finding a minimum weight bipartite matching, where the bipartite graph G(L 1 L2, E is constructed as follows: For each task t j, we use a vertex l j to denoted it, and add it to L 1. In other words, L 1 = {l j t j T, 1 j m}. For each device d i, we add min { R i r, m} vertices to L 2, where we use v i,k to denote the k-th vertex of device d i. Hence, L 2 = {v i,k d i D, 1 k min { Ri r, m} }. For each pair of vertices (l j, v i,k, where l j L 1, v i,k L 2, we add an edge between them. That is, E = {(l j, v i,k l j L 1, v i,k L 2 }. For each edge (l j, v i,k E, we assign weight b i,j on it. With the above graph G(L 1 L2, E, we can get that
6 Lemma 5 The winning bid determination problem of minimizing the overall cost is equivalent to finding a minimum weight bipartite matching in graph G(L 1 L2, E, when r j = r for j. l 1 l 2 l 3 l 4 Proof: We first show that a feasible bipartite matching in graph G(L 1 L2, E is one of the feasible solutions of the problem defined in Section II-B. Without loss of generality, we use M = {(l j, v i,k } to denote a feasible matching in G(L 1 L2, E. Moreover, we set x i,j = 1 if there exists a matching (l i, v i,k M for k {1,, min { Ri r, m}, otherwise, we set it to. It is observed that for d i D, we have { x i,j min R } i r, m. (11 (l j,v i,k M This is reasonable, as for each device d i, there are only R i r vertices in L 2, and thus at most R i r matchings to it will be chosen. Thus, the matching M satisfies the constraint in Eq. (1. Moreover, the bipartite graph G(L 1 L2, E is a complete bipartite graph, which reveals that there exists a feasible matching with cardinality min{ L 1, L 2 }. Hence, the constraint in Eq. (6 can also be met. To sum up, a feasible matching in G(L 1 L2, E is one of the feasible solutions of the winning bids determination problem. Then, the matching with minimum weight in graph G(L 1 L2, E denotes a solution with minimum overall cost of task allocation. Hence, our problem can be converted into finding a minimum weight matching in G(L 1 L2, E. With the above Lemma, winning bids determination problem with the objective of minimizing the overall cost can be optimally solved by running an existing minimum weight matching algorithm in graph G(L 1 L2, E, which has polynomial-time computational complexity [25]. Let M = {(l j, v i,k } be the optimal matching with minimum weight in graph G(L 1 L2, E. Then, we can get the solution of winning bids determination as follows: set x i,j = 1 if there exists an edge (l j, v i,k M, where 1 k min { Ri r, m}, otherwise, we set x i,j =. Still take Fig. 1 as an example. We assume that all the tasks require the same amount of resources, e.g., r j = r = 2. Then, the auxiliary bipartite graph can be constructed in Fig. 2, where we omit the weights of the edges in the graph for simplicity. By running the existing minimum weight matching algorithm, we can get optimal winning bids {b 1,4, b 2,2, b 3,1, b 3,3 }. That is, the tasks t 1, t 2, t 3, t 4 will be assigned to devices 3, 2, 3, 1, respectively. B. Payment Strategy with VCG Mechanism In the above subsection, the winning bids can be optimally determined in polynomial time. To guarantee the truthfulness of the submitted bids, we now design a VCG auction mechanism to determine the payment to each mobile device that wins bids. VCG auction is one of the most popular auctions that ensure the truthfulness when the optimal allocation can be v 1,1 v 1,2 v 1,3 v 2,1 v 2,2 v 3,1 v 3,2 Fig. 2. The auxiliary bipartite graph for Fig. 1 with r j = r = 2 Algorithm 3: The payments of winning bids begin Construct G(L 1 L2, E by considering all the bids in B; Find a minimum weight matching M in graph G(L 1 L2, E; Set x i,j = 1 if there exists an edge (l j, v i,k belonging to the found matching M, for k; Calculate the overall cost C R B with {x i,j }; for x i,j = 1 do Construct new graph G (L 1 L2, E without the presence of b i,j ; Finding a minimum weight matching M in graph G ; Calculate the overall cost C R B\{b i,j } on the found matching M ; Set p i,j = C R B\{b i,j } ( C R B b i,j ; for x i,j = do Set p i,j = ; found. In VCG auction, the bid winning the game will be paid with the opportunity cost that its presence incurs to others. Without loss of generality, we use CB R and CR B\{b i,j} to denote the minimum overall cost required under the above optimal winning bids determination scheme, with and without the presence of the bid b i,j, by using the available resources R = {R i d i D}. It is noted that CB R x i,jb i,j denotes the total cost except for bid b i,j under the above optimal winning bids determination scheme. Then, bid b i,j s opportunity cost is defined as the difference between CB\{b R and i,j} CB R x i,jb i,j. In this way, bid b i,j s payment, denoted by p i,j, can be derived as follows: p i,j = C R B\{b i,j} ( C R B x i,j b i,j. (12 The detail of the designed VCG mechanism is presented in Algorithm 3. C. Theoretical Analysis We now theoretically analyze the performance of the above VCG-based auction mechanism on achieving the truthfulness, individual rationality, and computational efficiency. We first discuss the truthfulness. Lemma 6 The proposed VCG-based auction mechanism guarantees the truthfulness of the bids.
7 Proof: We assume that when bid b i,j is submitted truthfully, i.e., b i,j = c i,j, the decision of task allocation is denoted as {x i,j } with the optimal winning bids determination process shown in the above subsection. We also use p i,j to denote the payment offered for bid b i,j with truthful information. Suppose that bid b i,j is submitted untruthfully, i.e., b i,j c i,j. Then, there are two cases for bid b i,j : 1 x i,j = x i,j ; 2 x i,j x i,j. Case 1 (x i,j = x i,j : If x i,j = x i,j =, it is easy to get that their utilities are the same and both. Alternatively, if x i,j = x i,j = 1, we can obtain that C R B = C (R\{Ri} {R i r j} B\{b i,j } + b i,j (13 where (R\{R i } {R i r j } means that the left resources at device d i should exclude the resource used for task t j. Then, we have p i,j = C R B\{b i,j} ( C R B b i,j = C R B\{b i,j} ( C (R\{R i} {R i r j } B\{b i,j } + b i,j b i,j = C R B\{b i,j } C(R\{R i} {R i r j } B\{b i,j }. (14 It is noted that CB\{b R and i,j} C(R\{R i} {R i r j } B\{b i,j } are both indepent of the bid b i,j submitted by device d i. In this case, p i,j = p i,j. Hence, the utilities are the same. Case 2 (x i,j x i,j : We now derive the utility of bid b i,j in truthful case as follows: p i,j x i,jc i,j = C R B\{c i,j} ( C R B x i,jc i,j x i,j c i,j = C R B\{c i,j } CR B = C R B\{c i,j } ( C (R\{Ri} {R i x i,j rj} B\{c i,j } + x i,jc i,j ( CB\{c R i,j } C (R\{Ri} {R i x i,jr j} B\{c i,j } + x i,j c i,j = C R B\{c i,j } C(R\{Ri} {R i x i,jr j} B\{b i,j} x i,j c i,j = CB\{c R ( i,j} CB R x i,j b i,j xi,j c i,j = p i,j x i,j c i,j. (15 Hence, the utility with truthful information c i,j is no less than the utility with untruthful information b i,j. We then compare the utilities of the truthful and untruthful cases at device d i, denoted as u i and u i respectively, as follows: u i u i = ( p i,j x m i,jc i,j (p i,j x i,j c i,j = ( p i,j x i,jc i,j (p i,j x i,j c i,j. (16 To sum up, only if submitting the bids truthfully, the best utility can be achieved, which thus proves the above lemma. Based on the above result, we now analyze the individual rationality as follows. Lemma 7 With the above scheme, each mobile device achieves nonnegative utility. Proof: As analyzed in Lemma 6, each bid must be submitted truthfully, i.e., b i,j = c i,j. We now study the utility that can be achieved for each bid, by considering two cases: 1 x i,j =, and 2 x i,j = 1. Case 1 (x i,j = : In this case, the utility achieved for bid b i,j is. Case 2 (x i,j = 1: We can derive the utility of bid b i,j as follows: p i,j x i,jc i,j = C R B\{c i,j} CR B. (17 It is noted that CB\{c R i,j } must be no less than CR B. This is because, CB\{c R i,j } is only a feasible solution where b i,j fails its bid, and thus must be no less than the optimal solution CB R. Hence, the utility is no less than. To sum up, for each truthful bid, the utility achieved must be nonnegative. Hence, the sum of the utilities of all the bids submitted by each device must be also nonnegative, which proves the above lemma. Lemma 8 The proposed VCG-based auction mechanism is computationally efficient. Proof: As descried in Section IV-A, winning bids determination can be optimally solved with an existing minimum weight matching algorithm, whose complexity is at most O((max{ L 1, L 2 3. As L 1 = m and L 2 nm, the complexity of our winning bids determination process is at most O(n 3 m 3. Moreover, according to Algorithm 3, the complexity of determining the payments for all the winning bids is O(n 3 m 4. Thus, the proposed auction mechanism runs in polynomial time, and is computationally efficient. V. SIMULATION RESULTS In this section, we conduct simulations to evaluate the performance of the proposed mechanisms. Specifically, we study the properties such as individual rationality, truthfulness, computational efficiency, and system efficiency. Similar to [15], [16], we randomly generate the bids of the buyers according to a uniform distribution within (, 1]. The amount of resources required by each task is randomly selected from [1, 1], whereas the amount of resources available at each device is generated from [1, 3]. Moreover, these generated resource information must be able to guarantee that each task can finally be allocated to a mobile device successfully, as otherwise, we cannot find any feasible solution of the problem, i.e., violating the constraint in Eq. (6.
8 (a In heterogeneous case (b In homogeneous case.25.2 The final payment The submitted cost.2 The final payment The submitted cost.2 The bids/payments The selected winning bids The bids/payments The selected winning bids The utility of a single buyer with heterogeneous tasks with homogeneous tasks Fig. 3. Performance on individual rationality The ratio of the submitted bid to the truthful cost A. Performance on Individual Rationality We first investigate the performance of the proposed mechanisms on individual rationality. In this simulation, we study the proposed mechanisms for both heterogeneous and homogeneous task models. As shown in Fig. 3, we set m = 4, n = 2. Among all the winning buyers and sellers, we select 2 pairs of them, and present their submitted bids and the corresponding payments. From Fig. 3, we can see that in both models, the final payment earned at each seller must be no less than the bid it submitted. In other words, the individual rationality of the buyers can be achieved with the proposed auction mechanisms, which validates the theoretical analysis. B. Performance on the Truthfulness We now study the performance of the proposed mechanisms on guaranteeing the truthfulness of the bids. As shown in Fig. 4, the value in x-axis is defined as the b i,j c i,j. ratio of the submitted bid to the truthful valuation, i.e., For both heterogeneous and homogeneous task models, we randomly select one of the sellers, e.g., d i, and generate its bids b i,j according to the ratio shown in x-axis. Specifically, when the ratio is 1, the submitted bid b i,j is equal to the truthful information c i,j. According to Fig. 4, it is observed that the maximum utility is achieved when the seller ss b the truthful information, i.e., i,j c i,j = 1. Moreover, the larger the gap between the submitted bid and the truthful valuation, the lower the utility achieved at the seller. That is, only if the seller submits truthful information, the best utility can be obtained, which guarantees the truthfulness of the bids. C. Performance on System Efficiency and Running Time Finally, we study the performance of the proposed mechanism on the system efficiency and the running time. Here, system efficiency is defined as the overall execution cost of the tasks, which is the objective function defined in Eq. (4. It is noted that in homogeneous task model, the minimum execution cost can be achieved by running a minimum weight matching algorithm in polynomial time, which achieves the best system efficiency. Hence, we here omit homogeneous task model, and only investigate the system efficiency for heterogeneous task model. Fig. 5. The overal cost Fig. 4. Performance on the truthfulness Optimal task assignment scheme The proposed mechanism The number of tasks Performance on system efficiency for heterogeneous task model For fairly comparison, we introduce a baseline algorithm, named optimal task allocation scheme, by running an exhaustive searching algorithm in exponential time. After optimally allocating tasks to the corresponding mobile devices, the traditional VCG auction can then be used to decide the final payments of the sellers, so as to guarantee the truthfulness of the bids. As shown in Fig. 5, we set n = 2, and vary the number of tasks from 5 to 4. It is observed that our proposed mechanism performs worse than the optimal task allocation scheme in minimizing the overall execution cost. However, the gap between them is very small. Moreover, we present the running times of the proposed mechanism and the optimal task assignment scheme in Fig. 6. It shows that although the proposed mechanism achieves lower system efficiency, its running time is much less than the optimal task allocation scheme, which is particularly important for a large mobile cloud system. Furthermore, from Fig. 5 and Fig. 6, we can also see that both the overall cost and the running time increase with the number of tasks.
9 The running time (ms Fig x 1 4 Optimal task assignment scheme The proposed mechanism The number of tasks Performance on running time for heterogeneous task model VI. CONCLUSION In this paper, we consider mobile task assignment problem in MDCs. To capture the interactions between the owners of the tasks and the mobile devices, we construct an auction model, where the mobile devices act as the sellers of resources, and the tasks act as the buyers. We design two auction mechanisms for two task models, heterogeneous and homogeneous tasks, respectively. Specifically, for heterogeneous task model, we design an efficient sub-optimal winning bids determination algorithm and decide the payment for each winning bid. For homogeneous task model, we show that the optimal winning bids determination problem can be converted into finding a minimum weight matching in an auxiliary bipartite graph, based on which, a VCG-based auction mechanism is designed to decide the payments of the winning bids. Theoretical analysis and simulation results show that the proposed auction mechanisms both achieve certain desired properties including individual rationality, truthfulness, and computational efficiency. REFERENCES [1] J. Paczkowski, iphone owners would like to replace battery, Available: toreplace-battery-att, Aug. 29. [2] A. P. Miettinen, and J. K. Nurminen, Energy efficiency of mobile clients in cloud computing, in Proceedings of the 2nd USENIX conference on hot topics in cloud computing, pp. 1 7, Berkeley, CA, USA, 21. [3] M. Satyanarayanan, Fundamental challenges in mobile computing in Proceedings of ACM Symposium on Principles of Distributed Computing (PODC, pp. 1 7, Philttdelphia PA, USA, [4] E. Cuervo, A. Balasubramanian, D. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, Maui: making smartphones last longer with code offload, in Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (ACM MobiSys, pp , San Francisco, CA, USA, 21. [5] B. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, Clonecloud: elastic execution between mobile device and cloud, in Proceedings of the sixth Conference on Computer Systems (EuroSys, pp , Salzburg, Austria, 211. [6] A. Khan, M. Othman, S. Madani and S. U. Khan, A survey of mobile cloud computing application models, IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp , 214. [7] A. Mtibaa, A. Fahim, K. Harras, and M. Ammar, Towards resource sharing in mobile device clouds: Power balancing across mobile devices, in Proceedings of the second edition of the MCC workshop on Mobile cloud computing (MCC, pp , Hong Kong, 213. [8] A. Mtibaa, K. A. Harras, and A. Fahim, Towards computational offloading in mobile device clouds, in Proceedings of IEEE International Conference on Cloud Computing Technology and Science, pp , Bristol, 213. [9] Y. Kao, B. Krishnamachari, M. Ra,and F. Bai, Hermes: latency optimal task assignment for resource-constrained mobile computing, in Proceedings of IEEE International Conference on Computer Communications (INFOCOM, pp , Hong Kong, 215. [1] F. Liu, P. Shu, H. Jin, L. Ding, J. Yu, D. Niu, and B. Li, Gearing resource poor mobile devices with powerful clouds: architectures, challenges, and applications, IEEE Wireless Communications, vol. 2, no. 3, pp , 213. [11] S. Noor, R. Hasan and M. Haque, Cellcould: a novel cost effective formation of mobile cloud based on bidding incentives, in Proceedings of IEEE International Conference on Cloud Computing, pp. 2 27, Anchorage, AK, 214. [12] J. Song, Y. Cui, M. Li, J. Qiu and R. Buyya, Energy-traffic tradeoff cooperative offloading for mobile cloud computing, in Proceedings of IEEE 22nd International Symposium of Quality of Service (IWQoS, pp , Hong Kong, 214. [13] E. Miluzzo, R. C. Ceres and Y. Chen, Vision: mclouds - computing on clouds of mobile devices, in Proceedings of the third ACM workshop on Mobile Cloud Computing and Services (MCS 12, pp. 9 14, New York, NY, USA, 212. [14] X. Wang, X. Chen, W. Wu, N. An, L. Wang, Cooperative application execution in mobile cloud computing: a stackelberg game approach, IEEE Communications Letters, vol. 2, no. 5, pp , 216. [15] A. L. Jin, W. Song, P. Wang, D. Niyato, P. Ju, Auction mechanisms toward efficient resource sharing for cloudlets in mobile cloud computing, IEEE Transactions on Services Computing, vol. PP, no. 99, pp. 1 14, doi: 1.119/TSC , 215. [16] A. L. Jin, W. Song, W. Zhuang, Auction-based resource allocation for sharing cloudlets in mobile cloud computing, IEEE Transactions on Emerging Topics in Computing, vol. PP, no. 99, pp. 1 12, doi: 1.119/TETC , 215. [17] V. Krishna, Auction Theory, 2nd ed. Academic Press, Aug. 29. [18] E. Clarke, Multipart pricing of public goods, Public Choice, vol. 11, no. 1, pp , [19] W. Vickrey, Counterspeculation, auctions, and competitive sealed ters, The Journal of Finance, vol. 16, no. 1, pp. 8 37, 212. [2] X. Zhang, G. Xue, R. Yu, D. Yang, J. Tang, Truthful incentive mechanisms for crowdsourcing, in Proceedings of IEEE Conference on Computer Communications (INFOCOM, pp , Kowloon, Hong Kong, 215. [21] Z. Feng, Y. Zhu, Q. Zhang, L. M. Ni and A. V. Vasilakos, TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing, in Proceedings of IEEE Conference on Computer Communications (INFOCOM, pp , Toronto, 214. [22] H. Zhang, B. Liu, H. Susanto, G. Xue and T. Sun, Incentive Mechanism for Proximity-based Mobile Crowd Service Systems, in Proceedings of IEEE Conference on Computer Communications (INFOCOM, pp. 1 9, San Francisco, CA, USA, 216. [23] Y. Zhang, S. Tang, T. Chen, S. Zhong, Competitive Auctions for Costaware Cellular Traffic Offloading with Optimized Capacity Gain, in Proceedings of IEEE Conference on Computer Communications (INFO- COM, pp. 1 9, San Francisco, CA, USA, 216. [24] C. Chekuri and S. Khanna, A ptas for the multiple knapsack problem, in Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA, pp , 2. [25] N. Nisan, T. Roughgarden, E. Tardos, and V. V Vazirani, Algorithmic game theory, Cambridge University Press, 27.
The Index Coding Problem: A Game-Theoretical Perspective
The Index Coding Problem: A Game-Theoretical Perspective Yu-Pin Hsu, I-Hong Hou, and Alex Sprintson Department of Electrical and Computer Engineering Texas A&M University {yupinhsu, ihou, spalex}@tamu.edu
More informationSpectrum Auction Framework for Access Allocation in Cognitive Radio Networks
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 12-17-2010 Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks
More informationProfit Maximization in Mobile Crowdsourcing: A Truthful Auction Mechanism
Profit Maximization in Mobile Crowdsourcing: A Truthful Auction Mechanism Hamed Shah-Mansouri and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia,
More informationCombinatorial Auctions: A Survey by de Vries and Vohra
Combinatorial Auctions: A Survey by de Vries and Vohra Ashwin Ganesan EE228, Fall 2003 September 30, 2003 1 Combinatorial Auctions Problem N is the set of bidders, M is the set of objects b j (S) is the
More informationOptimal mobile device selection for mobile cloud service providing
J Supercomput (2016) 72:3222 3235 DOI 10.1007/s11227-016-1704-0 Optimal mobile device selection for mobile cloud service providing Ao Zhou 1 Shangguang Wang 1 Jinglin Li 1 Qibo Sun 1 Fangchun Yang 1 Published
More informationOptimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game
2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game Yuhua Xu, Zhan Gao and Wei
More informationCommunication Augmented Latest Possible Scheduling for Cloud Computing with Delay Constraint and Task Dependency
Communication Augmented Latest Possible Scheduling for Cloud Computing with Delay Constraint and Task Dependency Sowndarya Sundar and Ben Liang Department of Electrical and Computer Engineering University
More informationScheduling with Task Duplication for Application Offloading
Scheduling with Task Duplication for Application Offloading Arani Bhattacharya, Ansuman Banerjee, Pradipta De Stony Brook University and SUNY Korea, {arbhattachar@cs.stonybrook.edu} Indian Statistical
More informationA Survey of Recent Results on Real-Time Wireless Networking
A Survey of Recent Results on Real-Time Wireless Networking I-Hong Hou CSL and Department of Computer Science University of Illinois Urbana, IL 61801, USA ihou2@illinois.edu P. R. Kumar CSL and Department
More informationIMPLEMENTING TASK AND RESOURCE ALLOCATION ALGORITHM BASED ON NON-COOPERATIVE GAME THEORY IN CLOUD COMPUTING
DOI: http://dx.doi.org/10.26483/ijarcs.v9i1.5389 ISSN No. 0976 5697 Volume 9, No. 1, January-February 2018 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online
More informationA BGP-Based Mechanism for Lowest-Cost Routing
A BGP-Based Mechanism for Lowest-Cost Routing Joan Feigenbaum, Christos Papadimitriou, Rahul Sami, Scott Shenker Presented by: Tony Z.C Huang Theoretical Motivation Internet is comprised of separate administrative
More informationSALSA: Super-Peer Assisted Live Streaming Architecture
SALSA: Super-Peer Assisted Live Streaming Architecture Jongtack Kim School of EECS, INMC Seoul National University Email: jkim@netlab.snu.ac.kr Yugyung Lee School of Computing and Engineering University
More informationFlexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract
Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,
More informationWhy VCG auctions can hardly be applied to the pricing of inter-domain and ad hoc networks
Why VCG auctions can hardly be applied to the pricing of inter-domain and ad hoc networks Patrick Maillé GET/ENST Bretagne 2, rue de la Châtaigneraie - CS 17607 35576 Cesson Sévigné Cedex - FRANCE Email:
More informationApproximation Techniques for Utilitarian Mechanism Design
Approximation Techniques for Utilitarian Mechanism Design Department of Computer Science RWTH Aachen Germany joint work with Patrick Briest and Piotr Krysta 05/16/2006 1 Introduction to Utilitarian Mechanism
More informationImpersonation-Based Mechanisms
Impersonation-Based Mechanisms Moshe Babaioff, Ron Lavi, and Elan Pavlov Abstract In this paper we present a general scheme to create mechanisms that approximate the social welfare in the presence of selfish
More informationSecretary Problems and Incentives via Linear Programming
Secretary Problems and Incentives via Linear Programming Niv Buchbinder Microsoft Research, New England and Kamal Jain Microsoft Research, Redmond and Mohit Singh Microsoft Research, New England In the
More informationPrices and Auctions in Markets with Complex Constraints
Conference on Frontiers of Economics and Computer Science Becker-Friedman Institute Prices and Auctions in Markets with Complex Constraints Paul Milgrom Stanford University & Auctionomics August 2016 1
More informationA Game Theoretic Resource Allocation for Overall Energy Minimization in Mobile Cloud Computing System 1
A Game Theoretic Resource Allocation for Overall Energy Minimization in Mobile Cloud Computing System 1 Yang Ge, Yukan Zhang and Qinru Qiu Department of Electrical Engineering and Computer Science, Syracuse
More informationNetwork Improvement for Equilibrium Routing
Network Improvement for Equilibrium Routing UMANG BHASKAR University of Waterloo and KATRINA LIGETT California Institute of Technology Routing games are frequently used to model the behavior of traffic
More informationApproximation Algorithms for Item Pricing
Approximation Algorithms for Item Pricing Maria-Florina Balcan July 2005 CMU-CS-05-176 Avrim Blum School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 School of Computer Science,
More informationAn Optimal Control Policy in a Mobile Cloud Computing System Based on Stochastic Data
An Optimal Control Policy in a Mobile Cloud Computing System Based on Stochastic Data Xue Lin, Yanzhi Wang, and Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles,
More informationSecurity concern in computation offloading Technique
Security concern in computation offloading Technique Priyanka Dnyaneshwar Patil Department of Computer Engineering Raisoni College of Engineering Jalgaon, Mahartashtra, India Abstract: Nowadays, the increasing
More informationCross-Monotonic Multicast
Cross-Monotonic Multicast Zongpeng Li Department of Computer Science University of Calgary April 17, 2008 1 Multicast Multicast models one-to-many data dissemination in a computer network Example: live
More informationA Network Coloring Game
A Network Coloring Game Kamalika Chaudhuri, Fan Chung 2, and Mohammad Shoaib Jamall 2 Information Theory and Applications Center, UC San Diego kamalika@soe.ucsd.edu 2 Department of Mathematics, UC San
More informationMulti-user Mobile Cloud Offloading Game with Computing Access Point
Multi-user Mobile Cloud Offloading Game with Computing Access Point Meng-Hsi Chen and Ben Liang Dept. of Electrical and Computer Engineering University of Toronto Toronto, Canada Email: {mchen, liang}@ece.utoronto.ca
More informationVertical Handover Decision Strategies A double-sided auction approach
Vertical Handover Decision Strategies A double-sided auction approach Working paper Hoang-Hai TRAN Ph.d student DIONYSOS Team INRIA Rennes - Bretagne Atlantique 1 Content Introduction Handover in heterogeneous
More informationENDA: Embracing Network Inconsistency for Dynamic Application Offloading in Mobile Cloud Computing
ENDA: Embracing Network Inconsistency for Dynamic Application Offloading in Mobile Cloud Computing Jiwei Li Kai Bu Xuan Liu Bin Xiao Department of Computing The Hong Kong Polytechnic University {csjili,
More informationAn Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks
An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks Z. James Ji, Wei (Anthony) Yu, and K. J. Ray Liu Electrical and Computer Engineering Department and Institute for Systems Research
More informationGeneral properties of staircase and convex dual feasible functions
General properties of staircase and convex dual feasible functions JÜRGEN RIETZ, CLÁUDIO ALVES, J. M. VALÉRIO de CARVALHO Centro de Investigação Algoritmi da Universidade do Minho, Escola de Engenharia
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationDISTRIBUTED NETWORK RESOURCE ALLOCATION WITH INTEGER CONSTRAINTS. Yujiao Cheng, Houfeng Huang, Gang Wu, Qing Ling
DISTRIBUTED NETWORK RESOURCE ALLOCATION WITH INTEGER CONSTRAINTS Yuao Cheng, Houfeng Huang, Gang Wu, Qing Ling Department of Automation, University of Science and Technology of China, Hefei, China ABSTRACT
More informationSpectrum Bidding in Wireless Networks and Related
Spectrum Bidding in Wireless Networks and Related Xiang-Yang Li 1, Ping Xu 1, ShaoJie Tang 1, and XiaoWen Chu 2 1 Illinois Institute of Technology, Chicago, IL, USA, xli@cs.iit.edu, pxu3@iit.edu, stang7@iit.edu
More informationClustering-Based Distributed Precomputation for Quality-of-Service Routing*
Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,
More informationSIGNIFICANT contributions have been recently made to enhance
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 4, JUNE 2007 851 Noncollaborative Resource Management for Wireless Multimedia Applications Using Mechanism Design Fangwen Fu and Mihaela van der Schaar, Senior
More informationStreamloading: Low cost high quality video streaming. Shivendra S. Panwar (joint work with Amir Hosseini and Fraida Fund)
Streamloading: Low cost high quality video streaming Shivendra S. Panwar (joint work with Amir Hosseini and Fraida Fund) Modern Cellular Networks Modern Cellular Networks Evolution of modern cellular networks:
More informationOn the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games
On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games Bruno Codenotti Daniel Štefankovič Abstract The computational complexity of finding a Nash equilibrium in a nonzero sum bimatrix
More informationCOOPERATION-AWARE TOPOLOGY CONTROL
COOPERATION-AWARE TOPOLOGY CONTROL Vivek Srivastava Arlington, VA. USA. Ramakant Komali Blacksburg, VA. USA. Allen B. MacKenzie Blacksburg, VA. USA. Luiz A. DaSilva Arlington, VA. USA. ABSTRACT In ad hoc
More informationMODELING AND RESOURCE ALLOCATION IN MOBILE WIRELESS NETWORKS
Syracuse University SURFACE Dissertations - ALL SURFACE May 2018 MODELING AND RESOURCE ALLOCATION IN MOBILE WIRELESS NETWORKS Jing Wang Syracuse University Follow this and additional works at: https://surface.syr.edu/etd
More informationWITH the rapid development of smartphones and their
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 8, AUGUST 2017 7223 Movement-Based Incentive for Crowdsourcing Feng Tian, Student Member, IEEE,BoLiu, Member, IEEE, XiaoSun, Student Member, IEEE,
More informationα Coverage to Extend Network Lifetime on Wireless Sensor Networks
Noname manuscript No. (will be inserted by the editor) α Coverage to Extend Network Lifetime on Wireless Sensor Networks Monica Gentili Andrea Raiconi Received: date / Accepted: date Abstract An important
More informationIN CURRENT distributed systems such as computational
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 34, NO. 1, FEBRUARY 2004 77 Algorithmic Mechanism Design for Load Balancing in Distributed Systems Daniel Grosu, Student Member,
More informationDynamic Clustering of Data with Modified K-Means Algorithm
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Dynamic Clustering of Data with Modified K-Means Algorithm Ahamed Shafeeq
More informationMobile Offloading for Maximum Utility at Minimum Cost
ISSN 2278 0211 (Online) Mobile Offloading for Maximum Utility at Minimum Cost Anjana Antony M. Tech 4th Sem, Department of Computer Science & Engineering Dr. B. R. Prasad Babu Professor & HOD, Department
More informationUnderstanding the Internet Graph. Christos H. Papadimitriou
Understanding the Internet Graph Christos H. Papadimitriou www.cs.berkeley.edu/~christos Goals To understand the Internet topology using tools from graph and game theory To contribute to the rigorous foundations
More informationEnergy and Performance-Aware Task Scheduling in a Mobile Cloud Computing Environment
2014 IEEE International Conference on Cloud Computing Energy and Performance-Aware Task Scheduling in a Mobile Cloud Computing Environment Xue Lin, Yanzhi Wang, Qing Xie, Massoud Pedram Department of Electrical
More informationCoalition Formation towards Energy-Efficient Collaborative Mobile Computing. Liyao Xiang, Baochun Li, Bo Li Aug. 3, 2015
Coalition Formation towards Energy-Efficient Collaborative Mobile Computing Liyao Xiang, Baochun Li, Bo Li Aug. 3, 2015 Collaborative Mobile Computing Mobile offloading: migrating the computation-intensive
More informationUsing VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet
International Journal of Wireless Networks and Communications. ISSN 0975-6507 Volume 4, Number 1 (2012), pp. 71-81 International Research Publication House http://www.irphouse.com Using VCG based Designing
More informationDELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC
DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,
More informationApproximation Algorithms
Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A 4 credit unit course Part of Theoretical Computer Science courses at the Laboratory of Mathematics There will be 4 hours
More informationProject: A survey and Critique on Algorithmic Mechanism Design
Project: A survey and Critique on Algorithmic Mechanism Design 1 Motivation One can think of many systems where agents act according to their self interest. Therefore, when we are in the process of designing
More informationA New Combinatorial Design of Coded Distributed Computing
A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA
More informationVCG Auction-based Bandwidth Allocation with Network Coding in Wireless Networks
VCG Auction-based Bandwidth Allocation with Network Coding in Wireless Networks PIRIYA CHAIKIJWATANA TAKUJI TACHIBANA Nara Institute of Science and Technology Graduate School of Information Science 8916-5
More informationOn the Maximum Throughput of A Single Chain Wireless Multi-Hop Path
On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia
More informationCommunication Augmented Scheduling for Cloud Computing with Delay Constraint and Task Dependency. Sowndarya Sundar
Communication Augmented Scheduling for Cloud Computing with Delay Constraint and Task Dependency by Sowndarya Sundar A thesis submitted in conformity with the requirements for the degree of Master of Applied
More informationAn Efficient Approximation for the Generalized Assignment Problem
An Efficient Approximation for the Generalized Assignment Problem Reuven Cohen Liran Katzir Danny Raz Department of Computer Science Technion Haifa 32000, Israel Abstract We present a simple family of
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationBroadcast in Ad hoc Wireless Networks with Selfish Nodes: A Bayesian Incentive Compatibility Approach
Broadcast in Ad hoc Wireless Networks with Selfish Nodes: A Bayesian Incentive Compatibility Approach N. Rama Suri Research Student, Electronic Enterprises Laboratory, Dept. of Computer Science and Automation,
More informationLeast Cost Multicast Spanning Tree Algorithm for Local Computer Network
Least Cost Multicast Spanning Tree Algorithm for Local Computer Network Yong-Jin Lee 1 and M. Atiquzzaman 2 1 Department of Computer Science, Woosong University, 17-2 Jayang-Dong, Dong-Ku, Taejon 300-718,
More informationA priority based dynamic bandwidth scheduling in SDN networks 1
Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems
More informationOptimal Delay Constrained Offloading for Vehicular Edge Computing Networks
Optimal Delay Constrained Offloading for Vehicular Edge Computing Networs Ke Zhang, Yuming Mao and Supeng Leng School of Communication and Information Engineering, University of Electronic Science and
More information2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006
2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,
More informationQoS-Aware Task Offloading in Distributed Cloudlets with Virtual Network Function Services
QoS-Aware Task Offloading in Distributed Cloudlets with Virtual Network Function Services Mike Jia Research School of Computer Science The Australian National University Canberra, ACT, Australia 2601 u5515287@anu.edu.au
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationCAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture
CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture Yuan-ni Liu Hong Tang, Guo-feng Zhao The School of Communication and Information Engineering of ChongQing University of Posts and
More informationAn Adaptive Threshold LBP Algorithm for Face Recognition
An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent
More informationMobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm
Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111
More informationUnderstanding the Power of Distributed. Coordination for Dynamic Spectrum Management
Understanding the Power of Distributed 1 Coordination for Dynamic Spectrum Management Lili Cao and Haitao Zheng Department of Computer Science University of California, Santa Barbara, CA 9316 U.S.A Email:
More information1 The Traveling Salesperson Problem (TSP)
CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation
More informationApproximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks
Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1
More informationA Semidefinite Relaxation Approach to Mobile Cloud Offloading with Computing Access Point
A Semidefinite Relaxation Approach to Mobile Cloud Offloading with Computing Access Point Meng-Hsi Chen, Ben Liang, Min Dong Dept of Electrical and Computer Engineering, University of Toronto, Canada Dept
More informationTHe recent popularization of cellular networks (e.g.,
1 An Incentive Framework for Cellular Traffic Offloading Xuejun Zhuo, Wei Gao, Member, IEEE, Guohong Cao, Fellow, IEEE, and Sha Hua Abstract Cellular networks (e.g., 3G) are currently facing severe traffic
More informationSpectrum Bidding in Wireless Networks and Related. Ping Xu. Advisor: Xiang-Yang Li 1. Feb. 11th, 2008
1 Advisor: Xiang-Yang Li 1 1 Illinois Institute of Technology Feb. 11th, 2008 Outline : : Spectrum Scarcity Problem Figure: Frequency Allocations of The Radio Spectrum in US. university-log White Space
More informationOptimal Topology Design for Overlay Networks
Optimal Topology Design for Overlay Networks Mina Kamel 1, Caterina Scoglio 1, and Todd Easton 2 1 Electrical and computer Engineering Department 2 Industrial and Manufacturing Systems Engineering Department
More informationGreen Cloudlet Network: A Sustainable Platform for Mobile Cloud Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. XX, NO. XX, XX 2017 1 Green Cloudlet Network: A Sustainable Platform for Mobile Cloud Computing Xiang Sun, Student Member, IEEE, and Nirwan Ansari, Fellow, IEEE
More informationAn Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks
An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks Xiuzhen Cheng, Min Ding Department of Computer Science The George Washington University Washington, DC 20052, USA {cheng,minding}@gwu.edu
More informationEnergy-Aware Scheduling for Acyclic Synchronous Data Flows on Multiprocessors
Journal of Interconnection Networks c World Scientific Publishing Company Energy-Aware Scheduling for Acyclic Synchronous Data Flows on Multiprocessors DAWEI LI and JIE WU Department of Computer and Information
More informationThoughtful Encounters in Mobile Computation Offloading to Cloud through Research
Thoughtful Encounters in Mobile Computation Offloading to Cloud through Research P.Mathivanan 1, Kodi.Satya Sridevi 2, S.Revathi 3, A.Sugandhi 4 1P.Mathivanan, Assistant Professor, Dept. of Information
More informationarxiv: v2 [cs.ni] 23 May 2016
Simulation Results of User Behavior-Aware Scheduling Based on Time-Frequency Resource Conversion Hangguan Shan, Yani Zhang, Weihua Zhuang 2, Aiping Huang, and Zhaoyang Zhang College of Information Science
More informationA New Reduction from 3-SAT to Graph K- Colorability for Frequency Assignment Problem
A New Reduction from 3-SAT to Graph K- Colorability for Frequency Assignment Problem Prakash C. Sharma Indian Institute of Technology Survey No. 113/2-B, Opposite to Veterinary College, A.B.Road, Village
More information2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes
2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or
More informationA Bayesian Game Formulation of Power Dissipation and Response Time Minimization in a Mobile Cloud Computing System
A Bayesian Game Formulation of Power Dissipation and Response Time inimization in a obile Cloud Computing System Yanzhi Wang, Xue Lin, and assoud Pedram Department of Electrical Engineering University
More informationTowards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage Chenxi Qiu
Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage Chenxi Qiu Holcombe Department of Electrical and Computer Engineering Outline 1. Introduction 2. Algorithm
More informationGroup Secret Key Generation Algorithms
Group Secret Key Generation Algorithms Chunxuan Ye and Alex Reznik InterDigital Communications Corporation King of Prussia, PA 9406 Email: {Chunxuan.Ye, Alex.Reznik}@interdigital.com arxiv:cs/07024v [cs.it]
More informationCAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture
CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture Yuan-ni Liu Hong Tang, Guo-feng Zhao The School of Communication and Information Engineering of ChongQing University of Posts and
More informationEnergy-Efficient Computation Offloading for Multicore-Based Mobile Devices
Energy-Efficient Computation Offloading for Multicore-Based Mobile Devices Yeli Geng, Yi Yang and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University E-mail: {yzg5086,
More informationRule Enforcement with Third Parties in Secure Cooperative Data Access
Rule Enforcement with Third Parties in Secure Cooperative Data Access Meixing Le, Krishna Kant, and Sushil Jajodia George Mason University, Fairfax, VA 22030 {mlep,kkant,jajodia}@gmu.edu Abstract. In this
More informationCore Membership Computation for Succinct Representations of Coalitional Games
Core Membership Computation for Succinct Representations of Coalitional Games Xi Alice Gao May 11, 2009 Abstract In this paper, I compare and contrast two formal results on the computational complexity
More informationHeuristic Algorithms for Multiconstrained Quality-of-Service Routing
244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service
More informationLeveraging Transitive Relations for Crowdsourced Joins*
Leveraging Transitive Relations for Crowdsourced Joins* Jiannan Wang #, Guoliang Li #, Tim Kraska, Michael J. Franklin, Jianhua Feng # # Department of Computer Science, Tsinghua University, Brown University,
More informationAdaptive Computation Offloading in Mobile Cloud Computing
Adaptive Offloading in Mobile Cloud Computing Vibha Tripathi MIO, NYC, U.S.A. Keywords: Abstract: Mobile Cloud Computing, Offloading, Data as a Service (DaaS), Platform as a Service (PaaS), Software as
More informationOnline Optimization of VM Deployment in IaaS Cloud
Online Optimization of VM Deployment in IaaS Cloud Pei Fan, Zhenbang Chen, Ji Wang School of Computer Science National University of Defense Technology Changsha, 4173, P.R.China {peifan,zbchen}@nudt.edu.cn,
More informationA Distributed Algorithm for the Replica Placement Problem
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS A Distributed Algorithm for the Replica Placement Problem Sharrukh Zaman, Student Member, IEEE, and Daniel Grosu, Senior Member, IEEE Abstract Caching
More informationLink Scheduling in Multi-Transmit-Receive Wireless Networks
Macau University of Science and Technology From the SelectedWorks of Hong-Ning Dai 2011 Link Scheduling in Multi-Transmit-Receive Wireless Networks Hong-Ning Dai, Macau University of Science and Technology
More informationCenter for Networked Computing
Concept of Mobile Cloud Computing (MCC): - Offload the computation complexity task from mobile devices to the cloud - Combination of cloud computing, mobile computing, and wireless networks to bring rich
More informationOffloading Dependent Tasks with Communication Delay and Deadline Constraint
Offloading Dependent Tasks with Communication Delay and Deadline Constraint Sowndarya Sundar and Ben Liang Department of Electrical and Computer Engineering University of Toronto, Ontario, Canada {ssundar,
More informationDelay Minimization for Relay-based Cooperative Data Exchange with Network Coding
Delay Minimization for Relay-based Cooperative Data Exchange with Network Coding Zheng Dong,XiuminWang,S.H.Dau, Chau Yuen Singapore University of Technology and Design, Singapore Hefei University of Technology,
More informationAutonomous Nodes and Distributed Mechanisms
Autonomous Nodes and Distributed Mechanisms John C. Mitchell 1 and Vanessa Teague 2 1 Stanford University, Stanford CA 94305, USA, mitchell@cs.stanford.edu 2 Stanford University, Stanford CA 94305, USA,
More informationCOPACC: A Cooperative Proxy-Client Caching System for On-demand Media Streaming
COPACC: A Cooperative - Caching System for On-demand Media Streaming Alan T.S. Ip 1, Jiangchuan Liu 2, and John C.S. Lui 1 1 The Chinese University of Hong Kong, Shatin, N.T., Hong Kong {tsip, cslui}@cse.cuhk.edu.hk
More informationImproved Approximation Algorithms for Budgeted Allocations
Improved Approximation Algorithms for Budgeted Allocations Yossi Azar 1,BenjaminBirnbaum 2, Anna R. Karlin 2, Claire Mathieu 3, and C. Thach Nguyen 2 1 Microsoft Research and Tel-Aviv University azar@tau.ac.il
More information