Towards Truthful Auction Mechanisms for Task Assignment in Mobile Device Clouds

Size: px
Start display at page:

Download "Towards Truthful Auction Mechanisms for Task Assignment in Mobile Device Clouds"

Transcription

1 Towards Truthful Auction Mechanisms for Task Assignment in Mobile Device Clouds Xiumin Wang, Xiaoming Chen, Weiwei Wu School of Computer and Information, Hefei University of Technology, Hefei, China College of Information Science and Electronic Engineering, Zhejiang University, China School of Computer Science and Engineering, Southeast University, Nanjing, China chen Corresponding author: Weiwei Wu, Abstract Despite the increased capabilities of mobile devices, resource-demanded mobile applications still transc what can be accomplished on a single device. As such, mobile device cloud (MDC, an environment that enables computation-intensive tasks to be performed among a set of nearby mobile devices, offers a promising architecture to support real-time mobile applications. To stimulate mobile devices to execute tasks for others, it is essential to design an incentive mechanism that appropriately charges the owners of the tasks, acted as the buyers, and rewards the mobile devices, acted as the sellers. In this paper, we propose two truthful auction mechanisms for two different task models, heterogeneous and homogeneous task models, which assume the different and the same resource requirements of the tasks, respectively. Specifically, for heterogeneous task model, we propose an efficient heuristic winning bids determination algorithm to allocate the tasks, and decide the payment of each seller for its winning bids. For homogeneous task model, we design an optimal winning bid determination algorithm, and propose a Vickrey- Clarke-Groves (VCG based auction mechanism to determine the payment of each bid. Both theoretical analysis and simulations show that the proposed auction mechanisms achieve several desirable properties such as individual rationality, truthfulness and computational efficiency. I. INTRODUCTION In recent years, mobile devices including smart phones have become ubiquitous in people s daily life, whereas they are still seriously constrained by their limited battery capacities and computation capabilities [1] [3]. Various application tasks, such as face recognition and natural language processing, exceed the limits of mobile devices. To solve this issue, one may offload their complex or resource-demanded tasks to remote cloud [4] [6]. However, this may suffer large internet latency and energy consumption, due to long communication distance. Fortunately, recent work shows that computational offloading can also be performed among a set of mobile devices forming what we called Mobile Device Clouds (MDCs [7], [8]. Generally, utilizing the unused resources of the nearby mobile devices in MDCs can achieve better system performance, e.g., reducing the latency and network congestion with short-range communications [9] [13]. Nevertheless, it is non-trivial to ask mobile devices to share their resources or execute tasks for others, as these may also incur extra cost to themselves, such as battery outage. In the literature, several works have been done to motivate mobile devices to provide their resources in mobile cloud platform [12] [16]. For example, [12] imposes a bill backlog on each mobile device. Once a device s bill backlog exceeds a threshold, it will be unable to get services from others. Although the fairness of mobile devices can be well achieved, it might not appeal to many mobile devices, as the mobile devices are always forced to provide services. The work in [13] also discusses the possible incentive schemes that can be designed in MDCs. However, it only considers the cost of the waiting time and cellular payment during task allocation, while omitting the practical resource requirement of tasks. [14] constructs a Stackelberg game model to investigate the interaction between the tasks and the mobile devices that can participate in task execution. The Stackelberg equilibrium is also achieved by appropriately determining the price charged to each task and the amount of tasks that each mobile device can work on. Nevertheless, this approach does not capture the preference of task execution. It is noted that tasks executed on different mobile devices may get different performances including completion time, communication latency, etc. Under such a circumstance, different mobile devices should get heterogeneous payments for task executions. Auction [17], a popular trading form that can efficiently allocate resources of sellers to buyers at competitive prices, has been widely used as one of the most popular incentive schemes in many areas. By viewing the resource trading system as an ecosystem, the auction mechanism can appropriately address the conflicts between the buyer s and seller s interests, the internal competitions among themselves, and guarantee the truthfulness of the submitted information. Based on this, [15], [16] design two auction mechanisms for cloudlet resource sharing in mobile cloud computing. However, these works assume the homogeneous resource requirement of the tasks. Moreover, [15], [16] limit the auction mechanism in a one-toone matching manner, which omits the fact that the resourcerich devices can support the resource requirements of multiple buyers in a practical system. Task allocation in MDCs also involves a resource trading between the owners of the tasks and the mobile devices in the system. In this paper, we aim to design an efficient auction mechanism to solve the task

2 assignment problem in MDCs, by considering a more practical model for resource requirements of the tasks and the resource availability of mobile devices. Auction mechanisms in other areas have also been studied in the literature [18] [23]. Specifically, Vickrey-Clarke-Groves (VCG auction [18], [19] requires that the optimal allocation of the resources must be guaranteed, otherwise, the truthfulness cannot be achieved. [2] designs an auction mechanism for crowdsourcing. However, it assumes that each mobile device holds a set of predefined services, and if one of the bids submitted by a mobile device wins the auction, all its predefined services are traded, even if some of them are useless to the tasks. Moreover, it does not consider the resource requirements of task executions. In a similar way, [21] proposes a location-aware auction mechanism when assigning tasks in crowdsourcing. A dynamic auction mechanism is proposed in [22], which captures the mobile users mobility patterns through a sequence of correlated auctions. Nevertheless, most of the previous works omit the resource requirements of the tasks and the resource availabilities at mobile devices, which is quite important due to the resource scarcity of mobile devices in MDCs. Compared with the existing works, the auction problem considered in this paper mainly has the following three differences: (1 the mobile tasks may require different amount of resources for executions; (2 the number of tasks that can be executed at each mobile device is not a fixed value, deping on its resource availability and the resource requirements of the tasks allocated to it; (3 mobile device may have different preferences to the tasks allocated to it, because of different computation complexities etc. To capture the interaction between the owners of the tasks and the mobile devices participating in the system, we aim to design an efficient auction mechanism for task allocation in MDCs, where the tasks (or saying the owners of the tasks act as the buyers of mobile resources, and the mobile devices owning the resources act as the sellers. In the rest of the paper, we use the terminology of buyers and tasks, sellers and mobile devices, interchangeably. Specifically, we consider two task models, heterogeneous and homogeneous task models, respectively. In heterogeneous task model, each task is assumed to require different amounts of resources for execution, while homogeneous task model assumes the same amount of resource requirement for each task. The main contributions of this paper can be summarized as follows. For heterogeneous task model, we design an efficient auction mechanism to allocate the tasks and determine the payment. We prove that the proposed auction mechanism achieves certain properties, such as computational efficiency, individual rationality, and truthfulness. For homogeneous task model, we convert the task allocation problem into finding a minimum weight bipartite matching in an auxiliary bipartite graph. Based on that, we design an optimal auction mechanism based on VCG auction. Theoretical results also show the computational efficiency, individual rationality, and truthfulness of the scheme. We validate the desirable properties of the proposed auction mechanisms through simulations. The rest of the paper is organized as follows. Section II describes the system model and problem formulation. The auction mechanisms for heterogeneous and homogeneous task models are designed in Section III and Section IV, respectively. Section V presents the simulation results. Finally, we conclude the paper in Section VI. II. PROBLEM FORMULATION In this section, we first introduce the auction model. Then, we formulate the problem and present the desirable properties of the auction. A. Auction Model We consider a set of m indivisible tasks in T = {t 1, t 2,, t m } to be allocated to mobile devices in MDCs for executions. Without loss of generality, assume that running each task requires a certain amount of resources, e.g., CPU, memory, battery etc. Let r j be the amount of resources required for task t j. Suppose that D = {d 1, d 2,, d n } is the set of mobile devices in MDC that are willing to participate in task execution. Each mobile device d i submits its bids for the tasks, B i = {b i,1, b i,2,, b i,m }, where bid b i,j B i denotes the cost claimed by d i for executing task t j. To ease presentation, we use B = n i=1 B i to denote the set of all the bids submitted by the sellers in D. It is noted that, the bids to different tasks may not be the same, even from the same mobile device. This is reasonable, as different tasks may consume different batteries or completion time on mobile devices. Moreover, as each mobile device is also with limited resources, we use R i to denote the maximum amount of resources that can be provided by d i. As mentioned above, in our auction model, the tasks requiring the resources for executions act as the buyers, while the mobile devices owning the resources act as the sellers. To assist the matching between the buyers and sellers, a trusted third party auctioneer is necessary to administrate the trading. The detail of the auction process is described as follow. The auctioneer collects the tasks to be executed, including the information of the resource requirements of the tasks. Then, it initiates the auction to the sellers in D. Each seller in D privately submits its bids and the resource availability information to the auctioneer. Based on the bids and resource requirement/availability information, the auctioneer follows a predefined auction mechanism to determine the set of winning bids and the corresponding payments of the sellers. To ease presentation, we define the following variants: { 1, if di wins its bid for task t j ; x i,j =, otherwise. (1 p i,j : the final payment offered to d i for bid b i,j. (2

3 B. Problem Formulation Due to the distributed nature of mobile devices, the real execution cost of each task is generally private and unknown to others. In this case, some selfish mobile devices may manipulate the claimed cost to gain higher utility. To differentiate from the submitted bid, we use c i,j to denote the true cost of device d i for executing task t j. Then, for each device d i D, we can define its utility as follows: u i = (p i,j x i,j c i,j, d i D, (3 which is the net revenue earned at device d i by executing tasks for others. Firstly, the auctioneer needs to determine the winning bids and allocate the tasks to the corresponding mobile devices. Such winning bids determination problem can be formulated as follows. n min x i,j b i,j, (4 subject to i=1 x i,j r j R i, d i D, (5 n x i,j = 1, t j T. (6 i=1 In the above formulation, the objective is to minimize the sum of the claimed costs for executing tasks at mobile devices. The constraint in Eq. (5 limits that the overall amount of resources required by the tasks allocated to d i is no more than R i. The constraint in Eq. (6 denotes that each task must be allocated to one and exactly one mobile device. Secondly, based on the selected winning bids, the auctioneer further decides the final trading payment of the seller for each of its winning bid. It is noted that, seller d i is willing to make trade with t j for its bid b i,j, only if the payment is no less than its claimed cost b i,j. That is, p i,j b i,j. The goal of our work is to design a truthful auction mechanism that solves the above two problems. The designed mechanism should achieve the following properties. Individual rationality: it means the utility of each mobile device should be nonnegative, i.e., u i for d i D, which is a basic condition to stimulate the mobile devices participating in task execution. Computational efficiency: The algorithm should be solved in polynomial time, which is important to a practical system. Truthfulness: The bid submitted by each mobile device should be truthful, i.e., b i,j = c i,j where c i,j is the true cost of executing task t j at device d i. In the following sections, we aim to design truthful auction mechanisms by considering two different task models, heterogeneous and homogeneous task models, respectively. In heterogeneous task model, the tasks in T may require different amounts of resources. As such, the winning bids determination problem defined in Eq. (4 is NP-hard, by a polynomial-time reduction from Multiple Knapsack problem [24], a well-known NP-hard problem. For homogeneous task model, where the tasks require the same amount of resources, we will show in Section IV that the winning bids determination problem can be converted into finding a minimum weight matching in an auxiliary bipartite graph, which can be optimally solved in polynomial time. III. TRUTHFUL ACTION MECHANISM FOR HETEROGENEOUS TASK MODEL We now consider the heterogeneous task model, where the tasks require different amounts of resources. In this case, the winning bids determination problem is a NP-hard problem, and finding the optimal solution is with high complexity. Hence, we instead design a greedy algorithm which obtains a suboptimal solution with low computational complexity. Then, we propose a payment scheme to determine the payoff of each bid. Finally, we analyze the properties of the proposed mechanism. A. Greedy Winning Bids Determination Scheme For each bid submitted by the mobile devices, e.g., b i,j, we first define a parameter β i,j, named cost per unit resource, as follows: β i,j = b i,j r j. (7 In general, the bid with smaller cost per unit resource should have higher chance to win the bid. Hence, based on this parameter, we design a greedy algorithm to solve the winning bid determination problem. The greedy rule is to pick the next most unit-cost-efficient bid as the winning bid to allocate the task, until all the tasks are assigned. Specifically, we define T as the set of the tasks that have been assigned with mobile devices so far, and B as the set of the bids that can still be chosen as the winning bids so far. Initially, we have T =, B = m i=1 B i and x i,j =. Then, in each step, we conduct the following procedure. Select the bid, e.g., b i1,j 1, with the least cost per unit resource among the bids in B. That is, β i1,j 1 = min{β i,j b i,j B}. Add b i1,j 1 as one of the winning bids, i.e., x i1,j 1 = 1, and allocate the task t j1 to mobile device d i1, i.e., T = T {t i1 }. Correspondingly, remove bid β i1,j 1 from B. We then remove the bids that may violate the resource constraint of the device, or the bids that are useless for future task allocations. That is, remove the bid b i,j from T, if b i,j satisfies any of the following two conditions: Task t j has already been allocated with mobile device in the previous steps, i.e., n i=1 x i,j = 1. As such, the bids to task t j become useless, and should be removed.

4 Algorithm 1: Winning bids determination begin T =, B = B; x i,j =, for i, j; Calculate β i,j for each bid b i,j B; while T T do Choose the bid with the least cost per unit resource from B, denoted as b i1,j 1 ; Set b i1,j 1 as one of the winning bids, i.e., x i1,j 1 = 1; Remove b i1,j 1 from B; for b i,j B do Remove b i,j from B, if j = j 1 ; for d i D do Remove each bid b i,j from B, if R i m xi,jrj min {r j t j T T The resource left at device d i is not enough to support any other task in T T. That is, { R i x i,j r j min r j t j T T }. (8 Under such a circumstance, d i is unable to accept any new winning bid. Continue the above process, until all the tasks are allocated with mobile devices, i.e., T = T. The detail of the above process is presented in Algorithm 1. B. Payment Strategy Based on the winning bids determined in the above subsection, we then introduce how to decide the payment of each mobile device/seller for its winning bids. The payment should be such determined that each seller will honestly reports its real cost. It is noted that the bid that loses in the above subsection, will be paid by, i.e., p i,j = if x i,j =. The main idea of our payment scheme is to decide the payments of the winning bids one by one. Without loss of generality, we use B w as the set of winning bids selected in the above subsection, i.e., B w = {b i,j x i,j = 1}. The payment of winning bid b i,j B w is then decided as follows: Remove bid b i,j from the consideration bids in B. That is, B = m i=1 B i {b i,j }. Re-select the winning bids from set B as in Algorithm 1, until the task t j is allocated with a mobile device, e.g., d i. That is, the bid b i,j wins its bid for task t j without the presence of bid b i,j. We then set the payment for device d i s winning bid b i,j determined in Algorithm 1, as b i,j (i.e., the bid sent by device d i. The detail of deciding the payment for winning bid b i,j is presented in Algorithm 2. We continue the above process, until considering all the winning bids in B w. } ; Algorithm 2: The payment for winning bid b i,j begin T =, B = B\{b i,j }; x i,j =, for b i,j B; Calculate β i,j for b i,j B; while b i,j B x i,j < 1 do Choose the bid with the least cost per unit resource from B, denoted as b i1,j 1 ; Set b i1,j 1 as one of the alternative winning bids, i.e., x i 1,j 1 = 1; Remove b i1,j 1 from B; Remove all the conflicting bids as in Algorithm 1; Set p i,j = b i,j for winning bid b i,j, where x i,j = 1; Fig. 1. r 1 =2 r 2 =2 r 3 =3 r 4 =4 t d 1 t t 3 t 4 d 2 d 3 R 1 =6 R 2 =4 R 3 =5 An example to illustrate the winning bids determination process To illustrate the above process, we use Fig. 1 as an example. We assume that four tasks t 1, t 2, t 3, t 4 are to be allocated to mobile devices d 1, d 2, d 3. The amount of resources required by each task or available at each device is given near each vertex. The edge between task t j and device d i denotes the value of the bid b i,j. According to Algorithm 1, four bids b 3,1, b 3,3, b 1,4, b 2,2 will be selected as the winning bids. Furthermore, with Algorithm 2, the alternative winning bids for b 3,1, b 3,3, b 1,4, b 2,2 are b 1,1, b 2,3, b 2,4, b 1,2 respectively. Hence, tasks 1, 2, 3, 4 are allocated to devices 3, 2, 3, 1 with payments 2, 3, 3, 5 respectively. C. Theoretical Analysis We now analyze the properties of the proposed mechanism, including individual rationality, truthfulness, and computational efficiency. Lemma 1 The proposed auction mechanism achieves the individual rationality for each mobile device. Proof: Firstly, for a mobile device d i that has no winning bids, according to Algorithm 2, its payoff is zero, i.e., u i =. Secondly, for a mobile device d i that has winning bids, its utility can be calculated as u i = (p i,j x i,j c i,j = 3 5 b i,j B w (p i,j b i,j. (9 4

5 We then show that the utility obtained for each of its winning bids, e.g., b i,j B w, is non-negative, p i,j b i,j. When b i,j wins, its claimed cost must be smaller than its payment p i,j = b i,j, as otherwise, b i,j will win its bid instead of b i,j. Hence, for each winning bid that truthfully reports its bid, its utility must be nonnegative. We then analyze the computational efficiency as follows: Lemma 2 The proposed winning bids determination and payment schemes both have polynomial-time computational complexity. Proof: We first discuss the computation complexity of Algorithm 1. In Algorithm 1, we need to choose T winning bids. To select each winning bid, the bid with the least cost per unit resource in B must be found, and its complexity is O(mn. Furthermore, updating set B consumes at most O(mn complexity. Then, the complexity of selecting one winning bid is at most O(mn. Hence, the complexity of selecting all the winning bids for the tasks in T is O(m 2 n with Algorithm 1. We then analyze the complexity of Algorithm 2, which determines the payment for each winning bid. As presented, to obtain the payment of winning bid b i,j, Algorithm 2 needs to find an alternative bid for task t j, whose complexity is at most O(m 2 n. Then, the computation complexity of determining the payments of all the winning bids is O(m 3 n. To sum up, both Algorithm 1 and Algorithm 2 have polynomial-time complexity, which thus proves the above lemma. To demonstrate the truthfulness, we should prove that each mobile device will honestly submit all of its real costs. According to [25], the proposed mechanism is truthful if and only if it satisfies two conditions: 1 the wining bids determination algorithm is monotonic, and 2 each winning bid is paid the critical value. The definitions of monotonicity and critical value [25] are described as follows: Definition 1 Monotonicity: For each bid b i,j, if b i,j wins, then bid b i,j also wins, where b i,j = b i,j δ and δ >. Definition 2 Critical Value: For each bid b i,j, there is a critical value b i,j. Then, if the bid declares a cost that is not larger than b i,j, it must win, otherwise, it will not win. Based on above definitions, we can obtain that Lemma 3 The winning bids determination process in Algorithm 1 is monotonic. Proof: Suppose that b ik,j k is one of the winning bids determined in the k-th step with Algorithm 1. Then, there are k 1 bids won in the previous k 1 steps. Let (b i1,j 1, b i2,j 2,, b ik,j k be the list of the winning bids that have been determined in the first k steps. Assume that b ik,j k was replaced by another bid, e.g., b i k,j k, where b i,j = b i k,j k δ and δ >. According to Algorithm 1, it is easy to get that bid b i k,j k must also win in the k-th step or even earlier step. Thus, we prove that Algorithm 1 is monotonic. Lemma 4 Each winning bid is paid the critical value, with Algorithm 2. Proof: Suppose that b ik,j k wins its bid for task t jk, in the k-th step with Algorithm 1, and b i,j k is an alternative winning bid for task t jk without the presence of b ik,j k, determined with Algorithm 2. In this case, the payment of b ik,j k is set to b i,j k, i.e., p ik,j k = b i,j k. It is obvious that another bid b i,j k = p ik,j k δ, where δ >, would win, because its cost per unit resource must be lower than the cost per unit resource of bid b i,j k. On the contrary, the bid b i,j k = p ik,j k +δ, where δ >, will not win, as its cost per unit resource must be higher than that of b i,j k. Hence, we prove the above lemma. With the above analysis, we can analyze the truthfulness as follows. Theorem 1 The proposed auction mechanism is truthful. Proof: According to [25], we can easily get the theorem with Lemma 3 and Lemma 4. IV. AUCTION MECHANISM FOR HOMOGENEOUS TASK MODEL In this section, we consider the homogeneous task model, where each task is assumed to require the same amount of resources, i.e., r j = r. We first introduce an optimal winning bids determination algorithm. Then, we propose a VCG-based auction mechanism. Finally, we analyze the performance of the proposed mechanism. A. Optimal Winning Bids Determination Scheme Since the maximum amount of resources available at d i is R i, the number of tasks that d i can accept is constrained by Ri r and the overall number of tasks in T, m. In this case, the constraint in Eq. (5 becomes { x i,j min R } i r, m, d i D. (1 Then, the winning bids determination problem can be transformed into finding a minimum weight bipartite matching, where the bipartite graph G(L 1 L2, E is constructed as follows: For each task t j, we use a vertex l j to denoted it, and add it to L 1. In other words, L 1 = {l j t j T, 1 j m}. For each device d i, we add min { R i r, m} vertices to L 2, where we use v i,k to denote the k-th vertex of device d i. Hence, L 2 = {v i,k d i D, 1 k min { Ri r, m} }. For each pair of vertices (l j, v i,k, where l j L 1, v i,k L 2, we add an edge between them. That is, E = {(l j, v i,k l j L 1, v i,k L 2 }. For each edge (l j, v i,k E, we assign weight b i,j on it. With the above graph G(L 1 L2, E, we can get that

6 Lemma 5 The winning bid determination problem of minimizing the overall cost is equivalent to finding a minimum weight bipartite matching in graph G(L 1 L2, E, when r j = r for j. l 1 l 2 l 3 l 4 Proof: We first show that a feasible bipartite matching in graph G(L 1 L2, E is one of the feasible solutions of the problem defined in Section II-B. Without loss of generality, we use M = {(l j, v i,k } to denote a feasible matching in G(L 1 L2, E. Moreover, we set x i,j = 1 if there exists a matching (l i, v i,k M for k {1,, min { Ri r, m}, otherwise, we set it to. It is observed that for d i D, we have { x i,j min R } i r, m. (11 (l j,v i,k M This is reasonable, as for each device d i, there are only R i r vertices in L 2, and thus at most R i r matchings to it will be chosen. Thus, the matching M satisfies the constraint in Eq. (1. Moreover, the bipartite graph G(L 1 L2, E is a complete bipartite graph, which reveals that there exists a feasible matching with cardinality min{ L 1, L 2 }. Hence, the constraint in Eq. (6 can also be met. To sum up, a feasible matching in G(L 1 L2, E is one of the feasible solutions of the winning bids determination problem. Then, the matching with minimum weight in graph G(L 1 L2, E denotes a solution with minimum overall cost of task allocation. Hence, our problem can be converted into finding a minimum weight matching in G(L 1 L2, E. With the above Lemma, winning bids determination problem with the objective of minimizing the overall cost can be optimally solved by running an existing minimum weight matching algorithm in graph G(L 1 L2, E, which has polynomial-time computational complexity [25]. Let M = {(l j, v i,k } be the optimal matching with minimum weight in graph G(L 1 L2, E. Then, we can get the solution of winning bids determination as follows: set x i,j = 1 if there exists an edge (l j, v i,k M, where 1 k min { Ri r, m}, otherwise, we set x i,j =. Still take Fig. 1 as an example. We assume that all the tasks require the same amount of resources, e.g., r j = r = 2. Then, the auxiliary bipartite graph can be constructed in Fig. 2, where we omit the weights of the edges in the graph for simplicity. By running the existing minimum weight matching algorithm, we can get optimal winning bids {b 1,4, b 2,2, b 3,1, b 3,3 }. That is, the tasks t 1, t 2, t 3, t 4 will be assigned to devices 3, 2, 3, 1, respectively. B. Payment Strategy with VCG Mechanism In the above subsection, the winning bids can be optimally determined in polynomial time. To guarantee the truthfulness of the submitted bids, we now design a VCG auction mechanism to determine the payment to each mobile device that wins bids. VCG auction is one of the most popular auctions that ensure the truthfulness when the optimal allocation can be v 1,1 v 1,2 v 1,3 v 2,1 v 2,2 v 3,1 v 3,2 Fig. 2. The auxiliary bipartite graph for Fig. 1 with r j = r = 2 Algorithm 3: The payments of winning bids begin Construct G(L 1 L2, E by considering all the bids in B; Find a minimum weight matching M in graph G(L 1 L2, E; Set x i,j = 1 if there exists an edge (l j, v i,k belonging to the found matching M, for k; Calculate the overall cost C R B with {x i,j }; for x i,j = 1 do Construct new graph G (L 1 L2, E without the presence of b i,j ; Finding a minimum weight matching M in graph G ; Calculate the overall cost C R B\{b i,j } on the found matching M ; Set p i,j = C R B\{b i,j } ( C R B b i,j ; for x i,j = do Set p i,j = ; found. In VCG auction, the bid winning the game will be paid with the opportunity cost that its presence incurs to others. Without loss of generality, we use CB R and CR B\{b i,j} to denote the minimum overall cost required under the above optimal winning bids determination scheme, with and without the presence of the bid b i,j, by using the available resources R = {R i d i D}. It is noted that CB R x i,jb i,j denotes the total cost except for bid b i,j under the above optimal winning bids determination scheme. Then, bid b i,j s opportunity cost is defined as the difference between CB\{b R and i,j} CB R x i,jb i,j. In this way, bid b i,j s payment, denoted by p i,j, can be derived as follows: p i,j = C R B\{b i,j} ( C R B x i,j b i,j. (12 The detail of the designed VCG mechanism is presented in Algorithm 3. C. Theoretical Analysis We now theoretically analyze the performance of the above VCG-based auction mechanism on achieving the truthfulness, individual rationality, and computational efficiency. We first discuss the truthfulness. Lemma 6 The proposed VCG-based auction mechanism guarantees the truthfulness of the bids.

7 Proof: We assume that when bid b i,j is submitted truthfully, i.e., b i,j = c i,j, the decision of task allocation is denoted as {x i,j } with the optimal winning bids determination process shown in the above subsection. We also use p i,j to denote the payment offered for bid b i,j with truthful information. Suppose that bid b i,j is submitted untruthfully, i.e., b i,j c i,j. Then, there are two cases for bid b i,j : 1 x i,j = x i,j ; 2 x i,j x i,j. Case 1 (x i,j = x i,j : If x i,j = x i,j =, it is easy to get that their utilities are the same and both. Alternatively, if x i,j = x i,j = 1, we can obtain that C R B = C (R\{Ri} {R i r j} B\{b i,j } + b i,j (13 where (R\{R i } {R i r j } means that the left resources at device d i should exclude the resource used for task t j. Then, we have p i,j = C R B\{b i,j} ( C R B b i,j = C R B\{b i,j} ( C (R\{R i} {R i r j } B\{b i,j } + b i,j b i,j = C R B\{b i,j } C(R\{R i} {R i r j } B\{b i,j }. (14 It is noted that CB\{b R and i,j} C(R\{R i} {R i r j } B\{b i,j } are both indepent of the bid b i,j submitted by device d i. In this case, p i,j = p i,j. Hence, the utilities are the same. Case 2 (x i,j x i,j : We now derive the utility of bid b i,j in truthful case as follows: p i,j x i,jc i,j = C R B\{c i,j} ( C R B x i,jc i,j x i,j c i,j = C R B\{c i,j } CR B = C R B\{c i,j } ( C (R\{Ri} {R i x i,j rj} B\{c i,j } + x i,jc i,j ( CB\{c R i,j } C (R\{Ri} {R i x i,jr j} B\{c i,j } + x i,j c i,j = C R B\{c i,j } C(R\{Ri} {R i x i,jr j} B\{b i,j} x i,j c i,j = CB\{c R ( i,j} CB R x i,j b i,j xi,j c i,j = p i,j x i,j c i,j. (15 Hence, the utility with truthful information c i,j is no less than the utility with untruthful information b i,j. We then compare the utilities of the truthful and untruthful cases at device d i, denoted as u i and u i respectively, as follows: u i u i = ( p i,j x m i,jc i,j (p i,j x i,j c i,j = ( p i,j x i,jc i,j (p i,j x i,j c i,j. (16 To sum up, only if submitting the bids truthfully, the best utility can be achieved, which thus proves the above lemma. Based on the above result, we now analyze the individual rationality as follows. Lemma 7 With the above scheme, each mobile device achieves nonnegative utility. Proof: As analyzed in Lemma 6, each bid must be submitted truthfully, i.e., b i,j = c i,j. We now study the utility that can be achieved for each bid, by considering two cases: 1 x i,j =, and 2 x i,j = 1. Case 1 (x i,j = : In this case, the utility achieved for bid b i,j is. Case 2 (x i,j = 1: We can derive the utility of bid b i,j as follows: p i,j x i,jc i,j = C R B\{c i,j} CR B. (17 It is noted that CB\{c R i,j } must be no less than CR B. This is because, CB\{c R i,j } is only a feasible solution where b i,j fails its bid, and thus must be no less than the optimal solution CB R. Hence, the utility is no less than. To sum up, for each truthful bid, the utility achieved must be nonnegative. Hence, the sum of the utilities of all the bids submitted by each device must be also nonnegative, which proves the above lemma. Lemma 8 The proposed VCG-based auction mechanism is computationally efficient. Proof: As descried in Section IV-A, winning bids determination can be optimally solved with an existing minimum weight matching algorithm, whose complexity is at most O((max{ L 1, L 2 3. As L 1 = m and L 2 nm, the complexity of our winning bids determination process is at most O(n 3 m 3. Moreover, according to Algorithm 3, the complexity of determining the payments for all the winning bids is O(n 3 m 4. Thus, the proposed auction mechanism runs in polynomial time, and is computationally efficient. V. SIMULATION RESULTS In this section, we conduct simulations to evaluate the performance of the proposed mechanisms. Specifically, we study the properties such as individual rationality, truthfulness, computational efficiency, and system efficiency. Similar to [15], [16], we randomly generate the bids of the buyers according to a uniform distribution within (, 1]. The amount of resources required by each task is randomly selected from [1, 1], whereas the amount of resources available at each device is generated from [1, 3]. Moreover, these generated resource information must be able to guarantee that each task can finally be allocated to a mobile device successfully, as otherwise, we cannot find any feasible solution of the problem, i.e., violating the constraint in Eq. (6.

8 (a In heterogeneous case (b In homogeneous case.25.2 The final payment The submitted cost.2 The final payment The submitted cost.2 The bids/payments The selected winning bids The bids/payments The selected winning bids The utility of a single buyer with heterogeneous tasks with homogeneous tasks Fig. 3. Performance on individual rationality The ratio of the submitted bid to the truthful cost A. Performance on Individual Rationality We first investigate the performance of the proposed mechanisms on individual rationality. In this simulation, we study the proposed mechanisms for both heterogeneous and homogeneous task models. As shown in Fig. 3, we set m = 4, n = 2. Among all the winning buyers and sellers, we select 2 pairs of them, and present their submitted bids and the corresponding payments. From Fig. 3, we can see that in both models, the final payment earned at each seller must be no less than the bid it submitted. In other words, the individual rationality of the buyers can be achieved with the proposed auction mechanisms, which validates the theoretical analysis. B. Performance on the Truthfulness We now study the performance of the proposed mechanisms on guaranteeing the truthfulness of the bids. As shown in Fig. 4, the value in x-axis is defined as the b i,j c i,j. ratio of the submitted bid to the truthful valuation, i.e., For both heterogeneous and homogeneous task models, we randomly select one of the sellers, e.g., d i, and generate its bids b i,j according to the ratio shown in x-axis. Specifically, when the ratio is 1, the submitted bid b i,j is equal to the truthful information c i,j. According to Fig. 4, it is observed that the maximum utility is achieved when the seller ss b the truthful information, i.e., i,j c i,j = 1. Moreover, the larger the gap between the submitted bid and the truthful valuation, the lower the utility achieved at the seller. That is, only if the seller submits truthful information, the best utility can be obtained, which guarantees the truthfulness of the bids. C. Performance on System Efficiency and Running Time Finally, we study the performance of the proposed mechanism on the system efficiency and the running time. Here, system efficiency is defined as the overall execution cost of the tasks, which is the objective function defined in Eq. (4. It is noted that in homogeneous task model, the minimum execution cost can be achieved by running a minimum weight matching algorithm in polynomial time, which achieves the best system efficiency. Hence, we here omit homogeneous task model, and only investigate the system efficiency for heterogeneous task model. Fig. 5. The overal cost Fig. 4. Performance on the truthfulness Optimal task assignment scheme The proposed mechanism The number of tasks Performance on system efficiency for heterogeneous task model For fairly comparison, we introduce a baseline algorithm, named optimal task allocation scheme, by running an exhaustive searching algorithm in exponential time. After optimally allocating tasks to the corresponding mobile devices, the traditional VCG auction can then be used to decide the final payments of the sellers, so as to guarantee the truthfulness of the bids. As shown in Fig. 5, we set n = 2, and vary the number of tasks from 5 to 4. It is observed that our proposed mechanism performs worse than the optimal task allocation scheme in minimizing the overall execution cost. However, the gap between them is very small. Moreover, we present the running times of the proposed mechanism and the optimal task assignment scheme in Fig. 6. It shows that although the proposed mechanism achieves lower system efficiency, its running time is much less than the optimal task allocation scheme, which is particularly important for a large mobile cloud system. Furthermore, from Fig. 5 and Fig. 6, we can also see that both the overall cost and the running time increase with the number of tasks.

9 The running time (ms Fig x 1 4 Optimal task assignment scheme The proposed mechanism The number of tasks Performance on running time for heterogeneous task model VI. CONCLUSION In this paper, we consider mobile task assignment problem in MDCs. To capture the interactions between the owners of the tasks and the mobile devices, we construct an auction model, where the mobile devices act as the sellers of resources, and the tasks act as the buyers. We design two auction mechanisms for two task models, heterogeneous and homogeneous tasks, respectively. Specifically, for heterogeneous task model, we design an efficient sub-optimal winning bids determination algorithm and decide the payment for each winning bid. For homogeneous task model, we show that the optimal winning bids determination problem can be converted into finding a minimum weight matching in an auxiliary bipartite graph, based on which, a VCG-based auction mechanism is designed to decide the payments of the winning bids. Theoretical analysis and simulation results show that the proposed auction mechanisms both achieve certain desired properties including individual rationality, truthfulness, and computational efficiency. REFERENCES [1] J. Paczkowski, iphone owners would like to replace battery, Available: toreplace-battery-att, Aug. 29. [2] A. P. Miettinen, and J. K. Nurminen, Energy efficiency of mobile clients in cloud computing, in Proceedings of the 2nd USENIX conference on hot topics in cloud computing, pp. 1 7, Berkeley, CA, USA, 21. [3] M. Satyanarayanan, Fundamental challenges in mobile computing in Proceedings of ACM Symposium on Principles of Distributed Computing (PODC, pp. 1 7, Philttdelphia PA, USA, [4] E. Cuervo, A. Balasubramanian, D. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, Maui: making smartphones last longer with code offload, in Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (ACM MobiSys, pp , San Francisco, CA, USA, 21. [5] B. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, Clonecloud: elastic execution between mobile device and cloud, in Proceedings of the sixth Conference on Computer Systems (EuroSys, pp , Salzburg, Austria, 211. [6] A. Khan, M. Othman, S. Madani and S. U. Khan, A survey of mobile cloud computing application models, IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp , 214. [7] A. Mtibaa, A. Fahim, K. Harras, and M. Ammar, Towards resource sharing in mobile device clouds: Power balancing across mobile devices, in Proceedings of the second edition of the MCC workshop on Mobile cloud computing (MCC, pp , Hong Kong, 213. [8] A. Mtibaa, K. A. Harras, and A. Fahim, Towards computational offloading in mobile device clouds, in Proceedings of IEEE International Conference on Cloud Computing Technology and Science, pp , Bristol, 213. [9] Y. Kao, B. Krishnamachari, M. Ra,and F. Bai, Hermes: latency optimal task assignment for resource-constrained mobile computing, in Proceedings of IEEE International Conference on Computer Communications (INFOCOM, pp , Hong Kong, 215. [1] F. Liu, P. Shu, H. Jin, L. Ding, J. Yu, D. Niu, and B. Li, Gearing resource poor mobile devices with powerful clouds: architectures, challenges, and applications, IEEE Wireless Communications, vol. 2, no. 3, pp , 213. [11] S. Noor, R. Hasan and M. Haque, Cellcould: a novel cost effective formation of mobile cloud based on bidding incentives, in Proceedings of IEEE International Conference on Cloud Computing, pp. 2 27, Anchorage, AK, 214. [12] J. Song, Y. Cui, M. Li, J. Qiu and R. Buyya, Energy-traffic tradeoff cooperative offloading for mobile cloud computing, in Proceedings of IEEE 22nd International Symposium of Quality of Service (IWQoS, pp , Hong Kong, 214. [13] E. Miluzzo, R. C. Ceres and Y. Chen, Vision: mclouds - computing on clouds of mobile devices, in Proceedings of the third ACM workshop on Mobile Cloud Computing and Services (MCS 12, pp. 9 14, New York, NY, USA, 212. [14] X. Wang, X. Chen, W. Wu, N. An, L. Wang, Cooperative application execution in mobile cloud computing: a stackelberg game approach, IEEE Communications Letters, vol. 2, no. 5, pp , 216. [15] A. L. Jin, W. Song, P. Wang, D. Niyato, P. Ju, Auction mechanisms toward efficient resource sharing for cloudlets in mobile cloud computing, IEEE Transactions on Services Computing, vol. PP, no. 99, pp. 1 14, doi: 1.119/TSC , 215. [16] A. L. Jin, W. Song, W. Zhuang, Auction-based resource allocation for sharing cloudlets in mobile cloud computing, IEEE Transactions on Emerging Topics in Computing, vol. PP, no. 99, pp. 1 12, doi: 1.119/TETC , 215. [17] V. Krishna, Auction Theory, 2nd ed. Academic Press, Aug. 29. [18] E. Clarke, Multipart pricing of public goods, Public Choice, vol. 11, no. 1, pp , [19] W. Vickrey, Counterspeculation, auctions, and competitive sealed ters, The Journal of Finance, vol. 16, no. 1, pp. 8 37, 212. [2] X. Zhang, G. Xue, R. Yu, D. Yang, J. Tang, Truthful incentive mechanisms for crowdsourcing, in Proceedings of IEEE Conference on Computer Communications (INFOCOM, pp , Kowloon, Hong Kong, 215. [21] Z. Feng, Y. Zhu, Q. Zhang, L. M. Ni and A. V. Vasilakos, TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing, in Proceedings of IEEE Conference on Computer Communications (INFOCOM, pp , Toronto, 214. [22] H. Zhang, B. Liu, H. Susanto, G. Xue and T. Sun, Incentive Mechanism for Proximity-based Mobile Crowd Service Systems, in Proceedings of IEEE Conference on Computer Communications (INFOCOM, pp. 1 9, San Francisco, CA, USA, 216. [23] Y. Zhang, S. Tang, T. Chen, S. Zhong, Competitive Auctions for Costaware Cellular Traffic Offloading with Optimized Capacity Gain, in Proceedings of IEEE Conference on Computer Communications (INFO- COM, pp. 1 9, San Francisco, CA, USA, 216. [24] C. Chekuri and S. Khanna, A ptas for the multiple knapsack problem, in Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA, pp , 2. [25] N. Nisan, T. Roughgarden, E. Tardos, and V. V Vazirani, Algorithmic game theory, Cambridge University Press, 27.

The Index Coding Problem: A Game-Theoretical Perspective

The Index Coding Problem: A Game-Theoretical Perspective The Index Coding Problem: A Game-Theoretical Perspective Yu-Pin Hsu, I-Hong Hou, and Alex Sprintson Department of Electrical and Computer Engineering Texas A&M University {yupinhsu, ihou, spalex}@tamu.edu

More information

Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks

Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 12-17-2010 Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks

More information

Profit Maximization in Mobile Crowdsourcing: A Truthful Auction Mechanism

Profit Maximization in Mobile Crowdsourcing: A Truthful Auction Mechanism Profit Maximization in Mobile Crowdsourcing: A Truthful Auction Mechanism Hamed Shah-Mansouri and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia,

More information

Combinatorial Auctions: A Survey by de Vries and Vohra

Combinatorial Auctions: A Survey by de Vries and Vohra Combinatorial Auctions: A Survey by de Vries and Vohra Ashwin Ganesan EE228, Fall 2003 September 30, 2003 1 Combinatorial Auctions Problem N is the set of bidders, M is the set of objects b j (S) is the

More information

Optimal mobile device selection for mobile cloud service providing

Optimal mobile device selection for mobile cloud service providing J Supercomput (2016) 72:3222 3235 DOI 10.1007/s11227-016-1704-0 Optimal mobile device selection for mobile cloud service providing Ao Zhou 1 Shangguang Wang 1 Jinglin Li 1 Qibo Sun 1 Fangchun Yang 1 Published

More information

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game Yuhua Xu, Zhan Gao and Wei

More information

Communication Augmented Latest Possible Scheduling for Cloud Computing with Delay Constraint and Task Dependency

Communication Augmented Latest Possible Scheduling for Cloud Computing with Delay Constraint and Task Dependency Communication Augmented Latest Possible Scheduling for Cloud Computing with Delay Constraint and Task Dependency Sowndarya Sundar and Ben Liang Department of Electrical and Computer Engineering University

More information

Scheduling with Task Duplication for Application Offloading

Scheduling with Task Duplication for Application Offloading Scheduling with Task Duplication for Application Offloading Arani Bhattacharya, Ansuman Banerjee, Pradipta De Stony Brook University and SUNY Korea, {arbhattachar@cs.stonybrook.edu} Indian Statistical

More information

A Survey of Recent Results on Real-Time Wireless Networking

A Survey of Recent Results on Real-Time Wireless Networking A Survey of Recent Results on Real-Time Wireless Networking I-Hong Hou CSL and Department of Computer Science University of Illinois Urbana, IL 61801, USA ihou2@illinois.edu P. R. Kumar CSL and Department

More information

IMPLEMENTING TASK AND RESOURCE ALLOCATION ALGORITHM BASED ON NON-COOPERATIVE GAME THEORY IN CLOUD COMPUTING

IMPLEMENTING TASK AND RESOURCE ALLOCATION ALGORITHM BASED ON NON-COOPERATIVE GAME THEORY IN CLOUD COMPUTING DOI: http://dx.doi.org/10.26483/ijarcs.v9i1.5389 ISSN No. 0976 5697 Volume 9, No. 1, January-February 2018 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online

More information

A BGP-Based Mechanism for Lowest-Cost Routing

A BGP-Based Mechanism for Lowest-Cost Routing A BGP-Based Mechanism for Lowest-Cost Routing Joan Feigenbaum, Christos Papadimitriou, Rahul Sami, Scott Shenker Presented by: Tony Z.C Huang Theoretical Motivation Internet is comprised of separate administrative

More information

SALSA: Super-Peer Assisted Live Streaming Architecture

SALSA: Super-Peer Assisted Live Streaming Architecture SALSA: Super-Peer Assisted Live Streaming Architecture Jongtack Kim School of EECS, INMC Seoul National University Email: jkim@netlab.snu.ac.kr Yugyung Lee School of Computing and Engineering University

More information

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,

More information

Why VCG auctions can hardly be applied to the pricing of inter-domain and ad hoc networks

Why VCG auctions can hardly be applied to the pricing of inter-domain and ad hoc networks Why VCG auctions can hardly be applied to the pricing of inter-domain and ad hoc networks Patrick Maillé GET/ENST Bretagne 2, rue de la Châtaigneraie - CS 17607 35576 Cesson Sévigné Cedex - FRANCE Email:

More information

Approximation Techniques for Utilitarian Mechanism Design

Approximation Techniques for Utilitarian Mechanism Design Approximation Techniques for Utilitarian Mechanism Design Department of Computer Science RWTH Aachen Germany joint work with Patrick Briest and Piotr Krysta 05/16/2006 1 Introduction to Utilitarian Mechanism

More information

Impersonation-Based Mechanisms

Impersonation-Based Mechanisms Impersonation-Based Mechanisms Moshe Babaioff, Ron Lavi, and Elan Pavlov Abstract In this paper we present a general scheme to create mechanisms that approximate the social welfare in the presence of selfish

More information

Secretary Problems and Incentives via Linear Programming

Secretary Problems and Incentives via Linear Programming Secretary Problems and Incentives via Linear Programming Niv Buchbinder Microsoft Research, New England and Kamal Jain Microsoft Research, Redmond and Mohit Singh Microsoft Research, New England In the

More information

Prices and Auctions in Markets with Complex Constraints

Prices and Auctions in Markets with Complex Constraints Conference on Frontiers of Economics and Computer Science Becker-Friedman Institute Prices and Auctions in Markets with Complex Constraints Paul Milgrom Stanford University & Auctionomics August 2016 1

More information

A Game Theoretic Resource Allocation for Overall Energy Minimization in Mobile Cloud Computing System 1

A Game Theoretic Resource Allocation for Overall Energy Minimization in Mobile Cloud Computing System 1 A Game Theoretic Resource Allocation for Overall Energy Minimization in Mobile Cloud Computing System 1 Yang Ge, Yukan Zhang and Qinru Qiu Department of Electrical Engineering and Computer Science, Syracuse

More information

Network Improvement for Equilibrium Routing

Network Improvement for Equilibrium Routing Network Improvement for Equilibrium Routing UMANG BHASKAR University of Waterloo and KATRINA LIGETT California Institute of Technology Routing games are frequently used to model the behavior of traffic

More information

Approximation Algorithms for Item Pricing

Approximation Algorithms for Item Pricing Approximation Algorithms for Item Pricing Maria-Florina Balcan July 2005 CMU-CS-05-176 Avrim Blum School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 School of Computer Science,

More information

An Optimal Control Policy in a Mobile Cloud Computing System Based on Stochastic Data

An Optimal Control Policy in a Mobile Cloud Computing System Based on Stochastic Data An Optimal Control Policy in a Mobile Cloud Computing System Based on Stochastic Data Xue Lin, Yanzhi Wang, and Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles,

More information

Security concern in computation offloading Technique

Security concern in computation offloading Technique Security concern in computation offloading Technique Priyanka Dnyaneshwar Patil Department of Computer Engineering Raisoni College of Engineering Jalgaon, Mahartashtra, India Abstract: Nowadays, the increasing

More information

Cross-Monotonic Multicast

Cross-Monotonic Multicast Cross-Monotonic Multicast Zongpeng Li Department of Computer Science University of Calgary April 17, 2008 1 Multicast Multicast models one-to-many data dissemination in a computer network Example: live

More information

A Network Coloring Game

A Network Coloring Game A Network Coloring Game Kamalika Chaudhuri, Fan Chung 2, and Mohammad Shoaib Jamall 2 Information Theory and Applications Center, UC San Diego kamalika@soe.ucsd.edu 2 Department of Mathematics, UC San

More information

Multi-user Mobile Cloud Offloading Game with Computing Access Point

Multi-user Mobile Cloud Offloading Game with Computing Access Point Multi-user Mobile Cloud Offloading Game with Computing Access Point Meng-Hsi Chen and Ben Liang Dept. of Electrical and Computer Engineering University of Toronto Toronto, Canada Email: {mchen, liang}@ece.utoronto.ca

More information

Vertical Handover Decision Strategies A double-sided auction approach

Vertical Handover Decision Strategies A double-sided auction approach Vertical Handover Decision Strategies A double-sided auction approach Working paper Hoang-Hai TRAN Ph.d student DIONYSOS Team INRIA Rennes - Bretagne Atlantique 1 Content Introduction Handover in heterogeneous

More information

ENDA: Embracing Network Inconsistency for Dynamic Application Offloading in Mobile Cloud Computing

ENDA: Embracing Network Inconsistency for Dynamic Application Offloading in Mobile Cloud Computing ENDA: Embracing Network Inconsistency for Dynamic Application Offloading in Mobile Cloud Computing Jiwei Li Kai Bu Xuan Liu Bin Xiao Department of Computing The Hong Kong Polytechnic University {csjili,

More information

An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks

An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks Z. James Ji, Wei (Anthony) Yu, and K. J. Ray Liu Electrical and Computer Engineering Department and Institute for Systems Research

More information

General properties of staircase and convex dual feasible functions

General properties of staircase and convex dual feasible functions General properties of staircase and convex dual feasible functions JÜRGEN RIETZ, CLÁUDIO ALVES, J. M. VALÉRIO de CARVALHO Centro de Investigação Algoritmi da Universidade do Minho, Escola de Engenharia

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

DISTRIBUTED NETWORK RESOURCE ALLOCATION WITH INTEGER CONSTRAINTS. Yujiao Cheng, Houfeng Huang, Gang Wu, Qing Ling

DISTRIBUTED NETWORK RESOURCE ALLOCATION WITH INTEGER CONSTRAINTS. Yujiao Cheng, Houfeng Huang, Gang Wu, Qing Ling DISTRIBUTED NETWORK RESOURCE ALLOCATION WITH INTEGER CONSTRAINTS Yuao Cheng, Houfeng Huang, Gang Wu, Qing Ling Department of Automation, University of Science and Technology of China, Hefei, China ABSTRACT

More information

Spectrum Bidding in Wireless Networks and Related

Spectrum Bidding in Wireless Networks and Related Spectrum Bidding in Wireless Networks and Related Xiang-Yang Li 1, Ping Xu 1, ShaoJie Tang 1, and XiaoWen Chu 2 1 Illinois Institute of Technology, Chicago, IL, USA, xli@cs.iit.edu, pxu3@iit.edu, stang7@iit.edu

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

SIGNIFICANT contributions have been recently made to enhance

SIGNIFICANT contributions have been recently made to enhance IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 4, JUNE 2007 851 Noncollaborative Resource Management for Wireless Multimedia Applications Using Mechanism Design Fangwen Fu and Mihaela van der Schaar, Senior

More information

Streamloading: Low cost high quality video streaming. Shivendra S. Panwar (joint work with Amir Hosseini and Fraida Fund)

Streamloading: Low cost high quality video streaming. Shivendra S. Panwar (joint work with Amir Hosseini and Fraida Fund) Streamloading: Low cost high quality video streaming Shivendra S. Panwar (joint work with Amir Hosseini and Fraida Fund) Modern Cellular Networks Modern Cellular Networks Evolution of modern cellular networks:

More information

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games Bruno Codenotti Daniel Štefankovič Abstract The computational complexity of finding a Nash equilibrium in a nonzero sum bimatrix

More information

COOPERATION-AWARE TOPOLOGY CONTROL

COOPERATION-AWARE TOPOLOGY CONTROL COOPERATION-AWARE TOPOLOGY CONTROL Vivek Srivastava Arlington, VA. USA. Ramakant Komali Blacksburg, VA. USA. Allen B. MacKenzie Blacksburg, VA. USA. Luiz A. DaSilva Arlington, VA. USA. ABSTRACT In ad hoc

More information

MODELING AND RESOURCE ALLOCATION IN MOBILE WIRELESS NETWORKS

MODELING AND RESOURCE ALLOCATION IN MOBILE WIRELESS NETWORKS Syracuse University SURFACE Dissertations - ALL SURFACE May 2018 MODELING AND RESOURCE ALLOCATION IN MOBILE WIRELESS NETWORKS Jing Wang Syracuse University Follow this and additional works at: https://surface.syr.edu/etd

More information

WITH the rapid development of smartphones and their

WITH the rapid development of smartphones and their IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 8, AUGUST 2017 7223 Movement-Based Incentive for Crowdsourcing Feng Tian, Student Member, IEEE,BoLiu, Member, IEEE, XiaoSun, Student Member, IEEE,

More information

α Coverage to Extend Network Lifetime on Wireless Sensor Networks

α Coverage to Extend Network Lifetime on Wireless Sensor Networks Noname manuscript No. (will be inserted by the editor) α Coverage to Extend Network Lifetime on Wireless Sensor Networks Monica Gentili Andrea Raiconi Received: date / Accepted: date Abstract An important

More information

IN CURRENT distributed systems such as computational

IN CURRENT distributed systems such as computational IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 34, NO. 1, FEBRUARY 2004 77 Algorithmic Mechanism Design for Load Balancing in Distributed Systems Daniel Grosu, Student Member,

More information

Dynamic Clustering of Data with Modified K-Means Algorithm

Dynamic Clustering of Data with Modified K-Means Algorithm 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Dynamic Clustering of Data with Modified K-Means Algorithm Ahamed Shafeeq

More information

Mobile Offloading for Maximum Utility at Minimum Cost

Mobile Offloading for Maximum Utility at Minimum Cost ISSN 2278 0211 (Online) Mobile Offloading for Maximum Utility at Minimum Cost Anjana Antony M. Tech 4th Sem, Department of Computer Science & Engineering Dr. B. R. Prasad Babu Professor & HOD, Department

More information

Understanding the Internet Graph. Christos H. Papadimitriou

Understanding the Internet Graph. Christos H. Papadimitriou Understanding the Internet Graph Christos H. Papadimitriou www.cs.berkeley.edu/~christos Goals To understand the Internet topology using tools from graph and game theory To contribute to the rigorous foundations

More information

Energy and Performance-Aware Task Scheduling in a Mobile Cloud Computing Environment

Energy and Performance-Aware Task Scheduling in a Mobile Cloud Computing Environment 2014 IEEE International Conference on Cloud Computing Energy and Performance-Aware Task Scheduling in a Mobile Cloud Computing Environment Xue Lin, Yanzhi Wang, Qing Xie, Massoud Pedram Department of Electrical

More information

Coalition Formation towards Energy-Efficient Collaborative Mobile Computing. Liyao Xiang, Baochun Li, Bo Li Aug. 3, 2015

Coalition Formation towards Energy-Efficient Collaborative Mobile Computing. Liyao Xiang, Baochun Li, Bo Li Aug. 3, 2015 Coalition Formation towards Energy-Efficient Collaborative Mobile Computing Liyao Xiang, Baochun Li, Bo Li Aug. 3, 2015 Collaborative Mobile Computing Mobile offloading: migrating the computation-intensive

More information

Using VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet

Using VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet International Journal of Wireless Networks and Communications. ISSN 0975-6507 Volume 4, Number 1 (2012), pp. 71-81 International Research Publication House http://www.irphouse.com Using VCG based Designing

More information

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A 4 credit unit course Part of Theoretical Computer Science courses at the Laboratory of Mathematics There will be 4 hours

More information

Project: A survey and Critique on Algorithmic Mechanism Design

Project: A survey and Critique on Algorithmic Mechanism Design Project: A survey and Critique on Algorithmic Mechanism Design 1 Motivation One can think of many systems where agents act according to their self interest. Therefore, when we are in the process of designing

More information

A New Combinatorial Design of Coded Distributed Computing

A New Combinatorial Design of Coded Distributed Computing A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA

More information

VCG Auction-based Bandwidth Allocation with Network Coding in Wireless Networks

VCG Auction-based Bandwidth Allocation with Network Coding in Wireless Networks VCG Auction-based Bandwidth Allocation with Network Coding in Wireless Networks PIRIYA CHAIKIJWATANA TAKUJI TACHIBANA Nara Institute of Science and Technology Graduate School of Information Science 8916-5

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

Communication Augmented Scheduling for Cloud Computing with Delay Constraint and Task Dependency. Sowndarya Sundar

Communication Augmented Scheduling for Cloud Computing with Delay Constraint and Task Dependency. Sowndarya Sundar Communication Augmented Scheduling for Cloud Computing with Delay Constraint and Task Dependency by Sowndarya Sundar A thesis submitted in conformity with the requirements for the degree of Master of Applied

More information

An Efficient Approximation for the Generalized Assignment Problem

An Efficient Approximation for the Generalized Assignment Problem An Efficient Approximation for the Generalized Assignment Problem Reuven Cohen Liran Katzir Danny Raz Department of Computer Science Technion Haifa 32000, Israel Abstract We present a simple family of

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Broadcast in Ad hoc Wireless Networks with Selfish Nodes: A Bayesian Incentive Compatibility Approach

Broadcast in Ad hoc Wireless Networks with Selfish Nodes: A Bayesian Incentive Compatibility Approach Broadcast in Ad hoc Wireless Networks with Selfish Nodes: A Bayesian Incentive Compatibility Approach N. Rama Suri Research Student, Electronic Enterprises Laboratory, Dept. of Computer Science and Automation,

More information

Least Cost Multicast Spanning Tree Algorithm for Local Computer Network

Least Cost Multicast Spanning Tree Algorithm for Local Computer Network Least Cost Multicast Spanning Tree Algorithm for Local Computer Network Yong-Jin Lee 1 and M. Atiquzzaman 2 1 Department of Computer Science, Woosong University, 17-2 Jayang-Dong, Dong-Ku, Taejon 300-718,

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

Optimal Delay Constrained Offloading for Vehicular Edge Computing Networks

Optimal Delay Constrained Offloading for Vehicular Edge Computing Networks Optimal Delay Constrained Offloading for Vehicular Edge Computing Networs Ke Zhang, Yuming Mao and Supeng Leng School of Communication and Information Engineering, University of Electronic Science and

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

QoS-Aware Task Offloading in Distributed Cloudlets with Virtual Network Function Services

QoS-Aware Task Offloading in Distributed Cloudlets with Virtual Network Function Services QoS-Aware Task Offloading in Distributed Cloudlets with Virtual Network Function Services Mike Jia Research School of Computer Science The Australian National University Canberra, ACT, Australia 2601 u5515287@anu.edu.au

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture Yuan-ni Liu Hong Tang, Guo-feng Zhao The School of Communication and Information Engineering of ChongQing University of Posts and

More information

An Adaptive Threshold LBP Algorithm for Face Recognition

An Adaptive Threshold LBP Algorithm for Face Recognition An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

Understanding the Power of Distributed. Coordination for Dynamic Spectrum Management

Understanding the Power of Distributed. Coordination for Dynamic Spectrum Management Understanding the Power of Distributed 1 Coordination for Dynamic Spectrum Management Lili Cao and Haitao Zheng Department of Computer Science University of California, Santa Barbara, CA 9316 U.S.A Email:

More information

1 The Traveling Salesperson Problem (TSP)

1 The Traveling Salesperson Problem (TSP) CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

A Semidefinite Relaxation Approach to Mobile Cloud Offloading with Computing Access Point

A Semidefinite Relaxation Approach to Mobile Cloud Offloading with Computing Access Point A Semidefinite Relaxation Approach to Mobile Cloud Offloading with Computing Access Point Meng-Hsi Chen, Ben Liang, Min Dong Dept of Electrical and Computer Engineering, University of Toronto, Canada Dept

More information

THe recent popularization of cellular networks (e.g.,

THe recent popularization of cellular networks (e.g., 1 An Incentive Framework for Cellular Traffic Offloading Xuejun Zhuo, Wei Gao, Member, IEEE, Guohong Cao, Fellow, IEEE, and Sha Hua Abstract Cellular networks (e.g., 3G) are currently facing severe traffic

More information

Spectrum Bidding in Wireless Networks and Related. Ping Xu. Advisor: Xiang-Yang Li 1. Feb. 11th, 2008

Spectrum Bidding in Wireless Networks and Related. Ping Xu. Advisor: Xiang-Yang Li 1. Feb. 11th, 2008 1 Advisor: Xiang-Yang Li 1 1 Illinois Institute of Technology Feb. 11th, 2008 Outline : : Spectrum Scarcity Problem Figure: Frequency Allocations of The Radio Spectrum in US. university-log White Space

More information

Optimal Topology Design for Overlay Networks

Optimal Topology Design for Overlay Networks Optimal Topology Design for Overlay Networks Mina Kamel 1, Caterina Scoglio 1, and Todd Easton 2 1 Electrical and computer Engineering Department 2 Industrial and Manufacturing Systems Engineering Department

More information

Green Cloudlet Network: A Sustainable Platform for Mobile Cloud Computing

Green Cloudlet Network: A Sustainable Platform for Mobile Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. XX, NO. XX, XX 2017 1 Green Cloudlet Network: A Sustainable Platform for Mobile Cloud Computing Xiang Sun, Student Member, IEEE, and Nirwan Ansari, Fellow, IEEE

More information

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks Xiuzhen Cheng, Min Ding Department of Computer Science The George Washington University Washington, DC 20052, USA {cheng,minding}@gwu.edu

More information

Energy-Aware Scheduling for Acyclic Synchronous Data Flows on Multiprocessors

Energy-Aware Scheduling for Acyclic Synchronous Data Flows on Multiprocessors Journal of Interconnection Networks c World Scientific Publishing Company Energy-Aware Scheduling for Acyclic Synchronous Data Flows on Multiprocessors DAWEI LI and JIE WU Department of Computer and Information

More information

Thoughtful Encounters in Mobile Computation Offloading to Cloud through Research

Thoughtful Encounters in Mobile Computation Offloading to Cloud through Research Thoughtful Encounters in Mobile Computation Offloading to Cloud through Research P.Mathivanan 1, Kodi.Satya Sridevi 2, S.Revathi 3, A.Sugandhi 4 1P.Mathivanan, Assistant Professor, Dept. of Information

More information

arxiv: v2 [cs.ni] 23 May 2016

arxiv: v2 [cs.ni] 23 May 2016 Simulation Results of User Behavior-Aware Scheduling Based on Time-Frequency Resource Conversion Hangguan Shan, Yani Zhang, Weihua Zhuang 2, Aiping Huang, and Zhaoyang Zhang College of Information Science

More information

A New Reduction from 3-SAT to Graph K- Colorability for Frequency Assignment Problem

A New Reduction from 3-SAT to Graph K- Colorability for Frequency Assignment Problem A New Reduction from 3-SAT to Graph K- Colorability for Frequency Assignment Problem Prakash C. Sharma Indian Institute of Technology Survey No. 113/2-B, Opposite to Veterinary College, A.B.Road, Village

More information

2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes

2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes 2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or

More information

A Bayesian Game Formulation of Power Dissipation and Response Time Minimization in a Mobile Cloud Computing System

A Bayesian Game Formulation of Power Dissipation and Response Time Minimization in a Mobile Cloud Computing System A Bayesian Game Formulation of Power Dissipation and Response Time inimization in a obile Cloud Computing System Yanzhi Wang, Xue Lin, and assoud Pedram Department of Electrical Engineering University

More information

Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage Chenxi Qiu

Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage Chenxi Qiu Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage Chenxi Qiu Holcombe Department of Electrical and Computer Engineering Outline 1. Introduction 2. Algorithm

More information

Group Secret Key Generation Algorithms

Group Secret Key Generation Algorithms Group Secret Key Generation Algorithms Chunxuan Ye and Alex Reznik InterDigital Communications Corporation King of Prussia, PA 9406 Email: {Chunxuan.Ye, Alex.Reznik}@interdigital.com arxiv:cs/07024v [cs.it]

More information

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture Yuan-ni Liu Hong Tang, Guo-feng Zhao The School of Communication and Information Engineering of ChongQing University of Posts and

More information

Energy-Efficient Computation Offloading for Multicore-Based Mobile Devices

Energy-Efficient Computation Offloading for Multicore-Based Mobile Devices Energy-Efficient Computation Offloading for Multicore-Based Mobile Devices Yeli Geng, Yi Yang and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University E-mail: {yzg5086,

More information

Rule Enforcement with Third Parties in Secure Cooperative Data Access

Rule Enforcement with Third Parties in Secure Cooperative Data Access Rule Enforcement with Third Parties in Secure Cooperative Data Access Meixing Le, Krishna Kant, and Sushil Jajodia George Mason University, Fairfax, VA 22030 {mlep,kkant,jajodia}@gmu.edu Abstract. In this

More information

Core Membership Computation for Succinct Representations of Coalitional Games

Core Membership Computation for Succinct Representations of Coalitional Games Core Membership Computation for Succinct Representations of Coalitional Games Xi Alice Gao May 11, 2009 Abstract In this paper, I compare and contrast two formal results on the computational complexity

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

Leveraging Transitive Relations for Crowdsourced Joins*

Leveraging Transitive Relations for Crowdsourced Joins* Leveraging Transitive Relations for Crowdsourced Joins* Jiannan Wang #, Guoliang Li #, Tim Kraska, Michael J. Franklin, Jianhua Feng # # Department of Computer Science, Tsinghua University, Brown University,

More information

Adaptive Computation Offloading in Mobile Cloud Computing

Adaptive Computation Offloading in Mobile Cloud Computing Adaptive Offloading in Mobile Cloud Computing Vibha Tripathi MIO, NYC, U.S.A. Keywords: Abstract: Mobile Cloud Computing, Offloading, Data as a Service (DaaS), Platform as a Service (PaaS), Software as

More information

Online Optimization of VM Deployment in IaaS Cloud

Online Optimization of VM Deployment in IaaS Cloud Online Optimization of VM Deployment in IaaS Cloud Pei Fan, Zhenbang Chen, Ji Wang School of Computer Science National University of Defense Technology Changsha, 4173, P.R.China {peifan,zbchen}@nudt.edu.cn,

More information

A Distributed Algorithm for the Replica Placement Problem

A Distributed Algorithm for the Replica Placement Problem IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS A Distributed Algorithm for the Replica Placement Problem Sharrukh Zaman, Student Member, IEEE, and Daniel Grosu, Senior Member, IEEE Abstract Caching

More information

Link Scheduling in Multi-Transmit-Receive Wireless Networks

Link Scheduling in Multi-Transmit-Receive Wireless Networks Macau University of Science and Technology From the SelectedWorks of Hong-Ning Dai 2011 Link Scheduling in Multi-Transmit-Receive Wireless Networks Hong-Ning Dai, Macau University of Science and Technology

More information

Center for Networked Computing

Center for Networked Computing Concept of Mobile Cloud Computing (MCC): - Offload the computation complexity task from mobile devices to the cloud - Combination of cloud computing, mobile computing, and wireless networks to bring rich

More information

Offloading Dependent Tasks with Communication Delay and Deadline Constraint

Offloading Dependent Tasks with Communication Delay and Deadline Constraint Offloading Dependent Tasks with Communication Delay and Deadline Constraint Sowndarya Sundar and Ben Liang Department of Electrical and Computer Engineering University of Toronto, Ontario, Canada {ssundar,

More information

Delay Minimization for Relay-based Cooperative Data Exchange with Network Coding

Delay Minimization for Relay-based Cooperative Data Exchange with Network Coding Delay Minimization for Relay-based Cooperative Data Exchange with Network Coding Zheng Dong,XiuminWang,S.H.Dau, Chau Yuen Singapore University of Technology and Design, Singapore Hefei University of Technology,

More information

Autonomous Nodes and Distributed Mechanisms

Autonomous Nodes and Distributed Mechanisms Autonomous Nodes and Distributed Mechanisms John C. Mitchell 1 and Vanessa Teague 2 1 Stanford University, Stanford CA 94305, USA, mitchell@cs.stanford.edu 2 Stanford University, Stanford CA 94305, USA,

More information

COPACC: A Cooperative Proxy-Client Caching System for On-demand Media Streaming

COPACC: A Cooperative Proxy-Client Caching System for On-demand Media Streaming COPACC: A Cooperative - Caching System for On-demand Media Streaming Alan T.S. Ip 1, Jiangchuan Liu 2, and John C.S. Lui 1 1 The Chinese University of Hong Kong, Shatin, N.T., Hong Kong {tsip, cslui}@cse.cuhk.edu.hk

More information

Improved Approximation Algorithms for Budgeted Allocations

Improved Approximation Algorithms for Budgeted Allocations Improved Approximation Algorithms for Budgeted Allocations Yossi Azar 1,BenjaminBirnbaum 2, Anna R. Karlin 2, Claire Mathieu 3, and C. Thach Nguyen 2 1 Microsoft Research and Tel-Aviv University azar@tau.ac.il

More information