0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Combinatorial Auction Based on Social Choice in the Internet of Things
Authors :
Maede Esmaeili
1
Faria Nassiri-Mofakham
2
Fatemeh Hassanvand
3
1- University of Isfahan
2- University of Isfahan
3- دانشگاه اصفهان
Keywords :
Internet of Things،Combinatorial Auction،Winner Determination،Social Choice
Abstract :
The Internet of Things (IoT) enables smart Things to communicate via the Internet. Things are growing in number, and their need for multiple resources in a complementary manner engenders serious problems in resource allocation. Combinatorial Auctions (CA) are the optimal market mechanism for allocating such indivisible bundles. Since the abundance of bundles in the IoT market makes it impossible to bid on all bundles, Things express their preferences on some (and not all) bundles to make the winner determination amenable. We address the winner determination problem by proposing an allocation mechanism based on social choice methods, which operates on the number of requested resources, the number of bundles, the offered price, and the preferred weight of each bundle. These methods include Borda, Copeland, Average without Misery, Least Misery, and Hare. Finally, we demonstrate the evaluation of these methods in terms of execution time and envy-freeness among the Things.
Papers List
List of archived papers
A qualitative spoofing detection system based on LSTMs for IoMT
Iman Jafarian - Amirmasoud Sepehrian - Siavash Khorsandi
Wireless Virtual-Reality by considering Hybrid Beamforming in IEEE802.11ay standard
Nasim Alikhani - Abbas Mohammadi
طرحی برای تبدیل نمودارهای رفتاری BPMN به نمودار UML و تولید کد از آن
مهدیس صفری - احمد عبدالله زاده بارفروش
طراحی نرم افزاری مبتنی بر واقعیت افزوده با کاربرد فروش عینک
مینا علیانژاد - نسترن زنجانی - زهرا عسکری نژاد امیری
Detection and Identification of Cyber-Attacks in Cyber-Physical Systems Based on Machine Learning Methods
Zohre Nasiri Zarandi
Improving Long-Term Engagement of Insurance Brokerages by Providing Gamified Configurations Based on The Delphi Method
Hosein Bayati - Fattaneh Taghiyareh - Sahand Hashemi
A Nano-based High-Speed QCA circuit for Information Security with Image Masking
Saeid Seyedi - Hatam Abdoli
A Model-Driven Approach for Automatic Generation of Android Tourism Applications
Sara Adib - Bahman Zamani
شکلدهی سه بعدی پرتو و بهبود نرخ امن در شبکههای مخابراتی بیسیم-تواندادهشده مبتنی بر صفحات بازتابی هوشمند
کوثر انصاری - دکتر مهدی مجیدی
تشخیص حمله تزریق داده کاذب با روش OCD در شبکه هوشمند برق
محدثه جلیلی سنجرانی - سعید جلیلی - محمدکاظم شیخ الاسلامی
Samin Hamayesh - Version 40.3.1