Incentive Mechanisms for Resource Scaling-out Game of Stream Big Data Analytics
暂无分享,去创建一个
[1] R. Srikant,et al. Scheduling Storms and Streams in the Cloud , 2015, SIGMETRICS.
[2] Kenli Li,et al. A Framework of Price Bidding Configurations for Resource Usage in Cloud Computing , 2016, IEEE Transactions on Parallel and Distributed Systems.
[3] Gábor Terstyánszky,et al. Extending Science Gateway Frameworks to Support Big Data Applications in the Cloud , 2016, Journal of Grid Computing.
[4] L. Hurwicz. Outcome Functions Yielding Walrasian and Lindahl Allocations at Nash Equilibrium Points , 1979 .
[5] Sajal K. Das,et al. Incentive Mechanisms for Participatory Sensing , 2015, ACM Trans. Sens. Networks.
[6] Jun Guo,et al. The Role of Data Analysis in the Development of Intelligent Energy Networks , 2017, IEEE Network.
[7] Robert J. Meijer,et al. Dynamically Scaling Apache Storm for the Analysis of Streaming Data , 2015, 2015 IEEE First International Conference on Big Data Computing Service and Applications.
[8] Roy D. Sleator,et al. 'Big data', Hadoop and cloud computing in genomics , 2013, J. Biomed. Informatics.
[9] Albert Y. Zomaya,et al. CA-DAG: Modeling Communication-Aware Applications for Scheduling in Cloud Computing , 2015, Journal of Grid Computing.
[10] Sherali Zeadally,et al. Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud , 2015, IEEE Network.
[11] Qian Wu,et al. Designing Socially-Optimal Rating Protocols for Crowdsourcing Contest Dilemma , 2017, IEEE Transactions on Information Forensics and Security.
[12] Victor Medel Gracia,et al. Resource Efficiency to Partition Big Streamed Graphs , 2015, ISPDC.
[13] Michael Tighe,et al. Topology and Application Aware Dynamic VM Management in the Cloud , 2017, Journal of Grid Computing.
[14] Antonio Iera,et al. MIFaaS: A Mobile-IoT-Federation-as-a-Service Model for dynamic cooperation of IoT Cloud Providers , 2017, Future Gener. Comput. Syst..
[15] Hal R. Varian,et al. System Reliability and Free Riding , 2004, Economics of Information Security.
[16] Xiaoying Gan,et al. A Contract-Based Incentive Mechanism for Delayed Traffic Offloading in Cellular Networks , 2016, IEEE Transactions on Wireless Communications.
[17] Mingxuan Sun,et al. Constrained VCG Auction for Spatial Spectrum Reuse with Flexible Channel Evaluations , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[18] Matti Latva-aho,et al. Incentivizing Selected Devices to Perform Cooperative Content Delivery: A Carrier Aggregation-Based Approach , 2016, IEEE Transactions on Wireless Communications.
[19] Nicolas Christin,et al. Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.
[20] José Antonio Lozano,et al. A Review of Auto-scaling Techniques for Elastic Applications in Cloud Environments , 2014, Journal of Grid Computing.
[21] George Kesidis,et al. On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants , 2015, 2015 IEEE 23rd International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.
[22] Chaitanya Swamy,et al. The effectiveness of Stackelberg strategies and tolls for network congestion games , 2007, SODA '07.
[23] Parinaz Naghizadeh Ardabili,et al. Exit equilibrium: Towards understanding voluntary participation in security games , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[24] Vijay Subramanian,et al. Incentivizing Sharing in Realtime D2D Streaming Networks: A Mean Field Game Perspective , 2016, IEEE/ACM Transactions on Networking.
[25] Dusit Niyato,et al. A Framework for Cooperative Resource Management in Mobile Cloud Computing , 2013, IEEE Journal on Selected Areas in Communications.
[26] Wei Song,et al. Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing , 2016, IEEE Transactions on Services Computing.
[27] MengChu Zhou,et al. VCG Auction-Based Dynamic Pricing for Multigranularity Service Composition , 2018, IEEE Transactions on Automation Science and Engineering.
[28] M. Shamim Hossain,et al. Efficient Resource Scheduling for Big Data Processing in Cloud Platform , 2014, IDCS.
[29] Jean C. Walrand,et al. How Bad Are Selfish Investments in Network Security? , 2011, IEEE/ACM Transactions on Networking.
[30] Tim Roughgarden,et al. Weighted Congestion Games: The Price of Anarchy, Universal Worst-Case Examples, and Tightness , 2014, TEAC.
[31] Michael P. Wellman,et al. Strategic formation of credit networks , 2012, WWW.
[32] Yuan Zhang,et al. On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for $k$ -Anonymity Location Privacy , 2016, IEEE Transactions on Information Forensics and Security.
[33] Stefano Leucci,et al. Locality-Based Network Creation Games , 2016, ACM Trans. Parallel Comput..
[34] Richard Wolski,et al. Eliciting honest value information in a batch-queue environment , 2007, 2007 8th IEEE/ACM International Conference on Grid Computing.
[35] Nicholas Bambos,et al. Security Decision-Making among Interdependent Organizations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.