Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Optimization and incentives in commu...
~
Jiang, Libin.
Linked to FindBook
Google Book
Amazon
博客來
Optimization and incentives in communication networks.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Optimization and incentives in communication networks./
Author:
Jiang, Libin.
Description:
176 p.
Notes:
Source: Dissertation Abstracts International, Volume: 71-06, Section: B, page: 3846.
Contained By:
Dissertation Abstracts International71-06B.
Subject:
Economics, General. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3410924
ISBN:
9781124031842
Optimization and incentives in communication networks.
Jiang, Libin.
Optimization and incentives in communication networks.
- 176 p.
Source: Dissertation Abstracts International, Volume: 71-06, Section: B, page: 3846.
Thesis (Ph.D.)--University of California, Berkeley, 2009.
Performance optimization of communication networks involves challenges at both the engineering level and the human level. In the first part of the dissertation, we study a network security game where strategic players choose their investments in security. Since a player's investment can reduce the propagation of computer viruses, a key feature of the game is the positive externality exerted by the investment. With selfish players, unfortunately, the overall network security can be far from optimum. First, we characterize the price of anarchy (POA) in the strategic-form game under an "effective-investment" model and a "bad-traffic" model, and give insight on how the POA depends on the network topology, the cost functions of the players, and their mutual influence (or externality). We show that the POA in general cannot be offset by the improvement of security technology. Second, in a repeated game, users have more incentive to cooperate. We characterize the socially best outcome that can be supported by the repeated game, as compared to the social optimum. We also introduce a Folk Theorem which only requires local punishments and rewards, but supports the same payoff region as the usual Folk Theorem. Finally, with a social planner who implements a due-care scheme which mandates the minimal investments, we study how the performance bound improves. Although our primary focus is Internet security, many results are generally applicable to games with positive externalities.
ISBN: 9781124031842Subjects--Topical Terms:
1017424
Economics, General.
Optimization and incentives in communication networks.
LDR
:03879nam 2200313 4500
001
1395045
005
20110506125553.5
008
130515s2009 ||||||||||||||||| ||eng d
020
$a
9781124031842
035
$a
(UMI)AAI3410924
035
$a
AAI3410924
040
$a
UMI
$c
UMI
100
1
$a
Jiang, Libin.
$3
1236054
245
1 0
$a
Optimization and incentives in communication networks.
300
$a
176 p.
500
$a
Source: Dissertation Abstracts International, Volume: 71-06, Section: B, page: 3846.
500
$a
Adviser: Jean Walrand.
502
$a
Thesis (Ph.D.)--University of California, Berkeley, 2009.
520
$a
Performance optimization of communication networks involves challenges at both the engineering level and the human level. In the first part of the dissertation, we study a network security game where strategic players choose their investments in security. Since a player's investment can reduce the propagation of computer viruses, a key feature of the game is the positive externality exerted by the investment. With selfish players, unfortunately, the overall network security can be far from optimum. First, we characterize the price of anarchy (POA) in the strategic-form game under an "effective-investment" model and a "bad-traffic" model, and give insight on how the POA depends on the network topology, the cost functions of the players, and their mutual influence (or externality). We show that the POA in general cannot be offset by the improvement of security technology. Second, in a repeated game, users have more incentive to cooperate. We characterize the socially best outcome that can be supported by the repeated game, as compared to the social optimum. We also introduce a Folk Theorem which only requires local punishments and rewards, but supports the same payoff region as the usual Folk Theorem. Finally, with a social planner who implements a due-care scheme which mandates the minimal investments, we study how the performance bound improves. Although our primary focus is Internet security, many results are generally applicable to games with positive externalities.
520
$a
In the second part of the dissertation, we consider the problem of achieving the maximum throughput and utility in a class of networks with resource-sharing constraints. This is a classical problem which had lacked an efficient distributed solution. First, we propose a fully distributed scheduling algorithm that achieves the maximum throughput. Inspired by CSMA (Carrier Sense Multiple Access) which is widely deployed in today's wireless networks, our algorithm is simple, asynchronous and easy to implement. Second, using a novel maximal-entropy technique, we combine the CSMA scheduling algorithm with congestion control to approach the maximum utility. Also, we further show that CSMA scheduling is a modular MAC-layer algorithm that can work with other protocols in the transport layer and network layer. Third, for wireless networks where packet collisions are unavoidable, we establish a general analytical model and extend the above algorithms to that case.
520
$a
Stochastic Processing Networks (SPNs) model manufacturing, communication, and service systems. In manufacturing networks, for example, service activities require parts and resources to produce other parts. SPNs are more general than queueing networks and pose novel challenges to throughput-optimum scheduling. In the third part of the dissertation, we proposes a "deficit maximum weight" (DMW) algorithm to achieve throughput optimality and maximize the net utility of the production in SPNs.
590
$a
School code: 0028.
650
4
$a
Economics, General.
$3
1017424
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
650
4
$a
Computer Science.
$3
626642
690
$a
0501
690
$a
0544
690
$a
0984
710
2
$a
University of California, Berkeley.
$3
687832
773
0
$t
Dissertation Abstracts International
$g
71-06B.
790
1 0
$a
Walrand, Jean,
$e
advisor
790
$a
0028
791
$a
Ph.D.
792
$a
2009
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3410924
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9158184
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login