Journal on Communications ›› 2015, Vol. 36 ›› Issue (12): 37-46.doi: 10.11959/j.issn.1000-436x.2015313
• Search • Previous Articles Next Articles
Li-hua YIN1,Yun-chuan GUO1,Hui-bing ZHANG2
Online:
2015-12-25
Published:
2017-07-17
Supported by:
Li-hua YIN,Yun-chuan GUO,Hui-bing ZHANG. Data provision for IoT searches:an auction approach[J]. Journal on Communications, 2015, 36(12): 37-46.
"
W1 | (r1,r2,r3) | (W1,W2,W3) | (r1,r2,r3) | ||
1.0 | (0.78 | ,0.78,0.78) | (1.5,1.8,2.0) | (0.42,0.78,0.84) | |
1.1 | (0.86 | ,0.72,0.72) | (3.0,2.5,5.0) | (0.28,0.10,1.04) | |
1.2 | (0.96 | ,0.66,0.66) | (2.0,2.5,1.9) | (0.52,0.86,0.46) | |
1.3 | (1.02 | ,0.60,0.60) | (4.0,8.0,5.0) | (0.04,0.94,0.26) | |
1.4 | (1.10 | ,0.54,0.54) | (3.0,2.5,1.9) | (0.88,0.60,0.24) | |
1.5 | (1.16 | ,0.48,0.48) | (4.0,3.0,2.0) | (0.98,0.52,0.04) |
[1] | 方滨兴, 刘克, 吴曼青 ,等. 大搜索技术白皮书[M]. 国家自然科学基金委, 2015. FANG B X , LIU K , WU M Q ,et al. Big Search[M]. National Natural Science Foundation of China, 2015. |
[2] | OSTERMAIER B , ROMERY K , MATTERN F ,et al. A real-time search engine for the Web of things[A]. Internet of Things[C]. 2010. 1-8. |
[3] | SOLDATOS J , DRAIEF M , MACDONALD C ,et al. Multimedia search over integrated social and sensor networks[A]. International Conference Companion on World Wide Web[C]. 2012. 283-286. |
[4] | FRANK C , BOLLIGER P , MATTERN F ,et al. The sensor Internet at work:locating everyday items using mobile phones[J]. Pervasive and Mobile Computing, 2008,4(3): 421-447. |
[5] | CHRISTOPHE B , VERDOT V , TOUBIANA V . Searching the Web of things[A]. IEEE International Conference on Semantic Computing (ICSC)[C]. 2011. 308-315. |
[6] | PERERA C , ZASLAVSKY A , LIU C H ,et al. Sensor search techniques for sensing as a service architecture for the Internet of Things[J]. IEEE Sensors Journal, 2013,14(2): 406-420. |
[7] | WANG H , TAN C C , LI Q . Snoogle:a search engine for pervasive environments[J]. IEEE Transactions on Parallel and Distributed Systems, 2010,21(8): 1188-1202. |
[8] | DING Z , CHEN Z , YANG Q . IoT-SVK search:a real-time multimodal search engine mechanism for the internet of things[J]. International Journal of Communication Systems, 2014,27(6): 871-897. |
[9] | SHEN H , MEMBER S , LIU J ,et al. SCPS:a social-aware distributed engine cyber-physical human-centric search[J]. IEEE Transactions on Computers, 2015,64(2): 518-532. |
[10] | CHEN Y , ZHOU J , GUO M . A context-aware search system for Internet of things based on hierarchical context model[J]. Telecommunication Systems, 2015, 1-15. |
[11] | NING T , YANG Z , WU H ,et al. Self-Interest-driven incentives for ad dissemination in autonomous mobile social networks[A]. Proceedings of the Annual IEEE International Conference on Computer Communications (INFOCOM)[C]. 2013. 2310-2318. |
[12] | ZHANG C , ZHU X , SONG Y ,et al. C4:a new paradigm for providing incentives in multi-hop wireless networks[A]. Proceedings of the Annual IEEE International Conference on Computer Communications (INFOCOM)[C]. 2011. 918-926. |
[13] | GUIZANI M , RACHEDI A , GUEGUEN C . Incentive scheduler algorithm for cooperation and coverage extension in wireless networks[J]. IEEE Transaction on Vehicular Technology, 2013,62(2): 797-808. |
[14] | TENG J , ZHANG B , BAI X ,et al. Incentive-driven and privacy-preserving message dissemination in large scale mobile networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(11): 2909-2919. |
[15] | GUO Y , YIN L , LIU L ,et al. Utility-based cooperative decision in cooperative authentication[A]. IEEE International Conference on Computer and Communications[C]. 2014. 1006-1014. |
[16] | REFAEI M T , DASILVA L A , ELTOWEISSY M ,et al. Adaptation of reputation management systems to dynamic network conditions in ad hoc networks[J]. IEEE Transactions on Computers, 2010,59(5): 707-719. |
[17] | MANSHAEI M H , ZHU Q , ALPCAN T ,et al. Game theory meets network security and privacy[J]. ACM Computing Surveys(CSUR), 2013,45(3): 1-39. |
[18] | LUO T , TAN H P , XIA L . Profit-maximizing incentive for participatory sensing[A]. IEEE International Conference on Computer and Communications(INFOCOM)[C]. 2014. 127-135. |
[19] | YANG D , XUE G , FANG X ,et al. Crowdsourcing to smartphones:incentive mechanism design for mobile phone sensing[A]. The 18th Annual International Conference on Mobile Computing and Networking (MobiComm)[C]. 2012. 173-184. |
[20] | ZHANG L , LI Z , WU C . Dynamic resource provisioning in cloud computing:a randomized auction approach[A]. IEEE International Conference on Computer and Communications (INFOCOM)[C]. 2014. 433-441. |
[21] | ZHAO J , LI H , WU C ,et al. Dynamic pricing and profit maximization for the cloud with geo-distributed data centers[A]. IEEE International Conference on Computer and Communications(INFOCOM)[C]. 2014. 118-126. |
[22] | DAVID E , AZOULAY-SCHWARTZ R , KRAUS S . Bidding in sealed-bid and English multi-attribute auctions[J]. Decision Support Systems, 2006,42(2): 527-556. |
[1] | Zaijian WANG, Huimin GU. Network slicing resource allocation strategy based on joint optimization [J]. Journal on Communications, 2023, 44(5): 234-245. |
[2] | Wei FAN, Cheng PENG, Dali ZHU, Yuqing WANG. Research on intrusion response strategy based on static Bayesian game in mobile edge computing network [J]. Journal on Communications, 2023, 44(2): 70-81. |
[3] | Xiaodong FU, Xinxin QI, Li LIU, Wei PENG, Jiaman DING, Fei DAI. Detecting and preventing collusion attack in DPoS based on power index [J]. Journal on Communications, 2022, 43(12): 123-133. |
[4] | Xumin HUANG, Yang ZHANG, Rong YU, Li JIANG, Hui TIAN, Yuan WU. Stackelberg game based energy optimization for unmanned aerial vehicle assisted wireless-powered Internet of things [J]. Journal on Communications, 2022, 43(12): 146-156. |
[5] | Lihua SONG, Yangyang JIANG, Changyou XING, Guomin ZHANG. Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception [J]. Journal on Communications, 2022, 43(11): 104-116. |
[6] | Zhibin FENG, Yuhua XU, Zhiyong DU, Xin LIU, Wen LI, Hao HAN, Xiaobo ZHANG. Active defense technology against intelligent jammer [J]. Journal on Communications, 2022, 43(10): 42-54. |
[7] | Hongbin ZHANG, Yan YIN, Dongmei ZHAO, Bin LIU. Network security situational awareness model based on threat intelligence [J]. Journal on Communications, 2021, 42(6): 182-194. |
[8] | Li ZHANG,Tian LIAO,Yejun HE. Dual-target WOA spectrum sharing algorithm based on Stackelberg game [J]. Journal on Communications, 2020, 41(9): 170-178. |
[9] | Lan YAO,Julong LAN. Adaptive SDN switch migration mechanism based on coalitional game [J]. Journal on Communications, 2020, 41(8): 1-10. |
[10] | Yongjin HU,Jun MA,Yuanbo GUO,Han ZHANG. Research on active defense based on multi-stage cyber deception game [J]. Journal on Communications, 2020, 41(8): 32-42. |
[11] | Jin QI,Hairong SUN,Kun GONG,Bin XU,Shunyi ZHANG,Yanfei SUN. Research on intelligent computing offloading model based on reputation value in mobile edge computing [J]. Journal on Communications, 2020, 41(7): 141-151. |
[12] | Shaohu DING,Ning QI,Yiwei GUO. Evaluation of mimic defense strategy based on M-FlipIt game model [J]. Journal on Communications, 2020, 41(7): 186-194. |
[13] | Chaoqiong FAN,Chenglin ZHAO,Bin LI. Hierarchical game based spectrum access optimization for anti-jamming in UAV network [J]. Journal on Communications, 2020, 41(6): 26-33. |
[14] | Lindong ZHAO,Wenqin ZHUANG,Jianxin CHEN,Liang ZHOU. Hierarchical task offloading in heterogeneous cellular network:modeling and optimization [J]. Journal on Communications, 2020, 41(4): 34-44. |
[15] | Ta LI,Youliang TIAN,Kang XIANG,Hongfeng GAO. Block-based fair payment scheme under delegation computation [J]. Journal on Communications, 2020, 41(3): 80-90. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|