首页 > 最新文献

IEEE Transactions on Mobile Computing最新文献

英文 中文
Harmonizing Global and Local Class Imbalance for Federated Learning 协调联邦学习的全局和局部阶级失衡
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-18 DOI: 10.1109/TMC.2024.3476340
Jialiang Zhu;Hao Zheng;Wenchao Xu;Haozhao Wang;Zhiming He;Yuxuan Liu;Shuang Wang;Qi Sun
Federated Learning (FL) is to collaboratively train a global model among distributed clients by iteratively aggregating their local updates without sharing their raw data, whereby the global modal can approximately converge to the centralized training way over a global dataset that composed of all local datasets (i.e., union of all users’ local data). However, in real-world scenarios, the distributions of the data classes are often imbalanced not only locally, but also in the global dataset, which severely deteriorate the FL performance due to the conflicting knowledge aggregation. Existing solutions for FL class imbalance either focus on the local data to regulate the training process or purely aim at the global datasets, which often fail to alleviate the class imbalance problem if there is mismatch between the local and global imbalance. Considering these limitations, this paper proposes a Global-Local Joint Learning method, namely GLJL, which simultaneously harmonizes the global and local class imbalance issue by jointly embedding the local and the global factors into each client’s loss function. Through extensive experiments over popular datasets with various class imbalance settings, we show that the proposed method can significantly improve the model accuracy over minority classes without sacrificing the accuracy of other classes.
联邦学习(FL)是在不共享原始数据的情况下,通过迭代地聚合客户端的本地更新,在分布式客户端之间协同训练全局模型,从而使全局模态近似地收敛于由所有本地数据集组成的全局数据集(即所有用户本地数据的联合)上的集中训练方式。然而,在现实场景中,数据类的分布往往不仅在局部,而且在全局数据集中都是不平衡的,由于知识聚集的冲突,严重影响了FL的性能。现有的FL类失衡的解决方案,要么着眼于局部数据来调节训练过程,要么纯粹针对全局数据集,如果局部失衡与全局失衡不匹配,往往无法缓解类失衡问题。考虑到这些局限性,本文提出了一种全局-局部联合学习方法,即GLJL,该方法通过将局部和全局因素共同嵌入到每个客户端的损失函数中,同时协调全局和局部类失衡问题。通过在具有各种类别不平衡设置的流行数据集上进行大量实验,我们表明该方法可以在不牺牲其他类别准确性的情况下显着提高少数类别的模型准确性。
{"title":"Harmonizing Global and Local Class Imbalance for Federated Learning","authors":"Jialiang Zhu;Hao Zheng;Wenchao Xu;Haozhao Wang;Zhiming He;Yuxuan Liu;Shuang Wang;Qi Sun","doi":"10.1109/TMC.2024.3476340","DOIUrl":"https://doi.org/10.1109/TMC.2024.3476340","url":null,"abstract":"Federated Learning (FL) is to collaboratively train a global model among distributed clients by iteratively aggregating their local updates without sharing their raw data, whereby the global modal can approximately converge to the centralized training way over a global dataset that composed of all local datasets (i.e., union of all users’ local data). However, in real-world scenarios, the distributions of the data classes are often imbalanced not only locally, but also in the global dataset, which severely deteriorate the FL performance due to the conflicting knowledge aggregation. Existing solutions for FL class imbalance either focus on the local data to regulate the training process or purely aim at the global datasets, which often fail to alleviate the class imbalance problem if there is mismatch between the local and global imbalance. Considering these limitations, this paper proposes a Global-Local Joint Learning method, namely GLJL, which simultaneously harmonizes the global and local class imbalance issue by jointly embedding the local and the global factors into each client’s loss function. Through extensive experiments over popular datasets with various class imbalance settings, we show that the proposed method can significantly improve the model accuracy over minority classes without sacrificing the accuracy of other classes.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"1120-1131"},"PeriodicalIF":7.7,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
O-RAN-Enabled Intelligent Network Slicing to Meet Service-Level Agreement (SLA) 支持o - ran的智能网络切片满足服务水平协议(SLA)
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-17 DOI: 10.1109/TMC.2024.3476338
Jiongyu Dai;Lianjun Li;Ramin Safavinejad;Shadab Mahboob;Hao Chen;Vishnu V Ratnam;Haining Wang;Jianzhong Zhang;Lingjia Liu
Network slicing plays a critical role in enabling multiple virtualized and independent network services to be created on top of a common physical network infrastructure. In this paper, we introduce a deep reinforcement learning (DRL)-based radio resource management (RRM) solution for radio access network (RAN) slicing under service-level agreement (SLA) guarantees. The objective of this solution is to minimize the SLA violation. Our method is designed with a two-level scheduling structure that works seamlessly under Open Radio Access Network (O-RAN) architecture. Specifically, at an upper level, a DRL-based inter-slice scheduler is working on a coarse time granularity to allocate resources to network slices. And at a lower level, an existing intra-slice scheduler such as proportional fair (PF) is working on a fine time granularity to allocate slice dedicated resources to slice users. This setting makes our solution O-RAN compliant and ready to be deployed as an ‘xApp’ on the RAN Intelligent Controller (RIC). For performance evaluation and proof of concept purposes, we develop two platforms, one industry-level simulator and one O-RAN compliant testbed; evaluation on both platforms demonstrates our solution’s superior performance over conventional methods.
网络切片在支持在公共物理网络基础设施之上创建多个虚拟化和独立的网络服务方面发挥着关键作用。在本文中,我们介绍了一种基于深度强化学习(DRL)的无线电资源管理(RRM)解决方案,用于服务水平协议(SLA)保证下的无线接入网(RAN)切片。此解决方案的目标是最小化SLA冲突。该方法采用两级调度结构,可在开放无线接入网(O-RAN)架构下无缝工作。具体来说,在上层,基于drl的片间调度器处理粗时间粒度,将资源分配给网络片。在较低的级别上,现有的片内调度器(如proportional fair (PF))正在处理精细的时间粒度,以便为片用户分配片专用资源。这种设置使我们的解决方案符合O-RAN标准,并且可以作为RAN智能控制器(RIC)上的“xApp”部署。为了进行性能评估和概念验证,我们开发了两个平台,一个工业级模拟器和一个O-RAN兼容测试平台;在两个平台上的评估表明,我们的解决方案优于传统方法。
{"title":"O-RAN-Enabled Intelligent Network Slicing to Meet Service-Level Agreement (SLA)","authors":"Jiongyu Dai;Lianjun Li;Ramin Safavinejad;Shadab Mahboob;Hao Chen;Vishnu V Ratnam;Haining Wang;Jianzhong Zhang;Lingjia Liu","doi":"10.1109/TMC.2024.3476338","DOIUrl":"https://doi.org/10.1109/TMC.2024.3476338","url":null,"abstract":"Network slicing plays a critical role in enabling multiple virtualized and independent network services to be created on top of a common physical network infrastructure. In this paper, we introduce a deep reinforcement learning (DRL)-based radio resource management (RRM) solution for radio access network (RAN) slicing under service-level agreement (SLA) guarantees. The objective of this solution is to minimize the SLA violation. Our method is designed with a two-level scheduling structure that works seamlessly under Open Radio Access Network (O-RAN) architecture. Specifically, at an upper level, a DRL-based inter-slice scheduler is working on a coarse time granularity to allocate resources to network slices. And at a lower level, an existing intra-slice scheduler such as proportional fair (PF) is working on a fine time granularity to allocate slice dedicated resources to slice users. This setting makes our solution O-RAN compliant and ready to be deployed as an ‘xApp’ on the RAN Intelligent Controller (RIC). For performance evaluation and proof of concept purposes, we develop two platforms, one industry-level simulator and one O-RAN compliant testbed; evaluation on both platforms demonstrates our solution’s superior performance over conventional methods.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"890-906"},"PeriodicalIF":7.7,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CV-Cast: Computer Vision–Oriented Linear Coding and Transmission CV-Cast:面向计算机视觉的线性编码与传输
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-15 DOI: 10.1109/TMC.2024.3478048
Jakub Žádník;Michel Kieffer;Anthony Trioux;Markku Mäkitalo;Pekka Jääskeläinen
Remote inference allows lightweight edge devices, such as autonomous drones, to perform vision tasks exceeding their computational, energy, or processing delay budget. In such applications, reliable transmission of information is challenging due to high variations of channel quality. Traditional approaches involving spatio-temporal transforms, quantization, and entropy coding followed by digital transmission may be affected by a sudden decrease in quality (the digital cliff) when the channel quality is less than expected during design. This problem can be addressed by using Linear Coding and Transmission (LCT), a joint source and channel coding scheme relying on linear operators only, allowing to achieve reconstructed per-pixel error commensurate with the wireless channel quality. In this paper, we propose CV-Cast: the first LCT scheme optimized for computer vision task accuracy instead of per-pixel distortion. Using this approach, for instance at 10 dB channel signal-to-noise ratio, CV-Cast requires transmitting 28% less symbols than a baseline LCT scheme in semantic segmentation and 15% in object detection tasks. Simulations involving a realistic 5G channel model confirm the smooth decrease in accuracy achieved with CV-Cast, while images encoded by JPEG or learned image coding (LIC) and transmitted using classical schemes at low Eb/N0 are subject to digital cliff.
远程推理允许轻型边缘设备(如自主无人机)执行超出其计算、能量或处理延迟预算的视觉任务。在这样的应用中,由于信道质量的高度变化,信息的可靠传输是具有挑战性的。传统的方法包括时空变换、量化和熵编码,然后进行数字传输,当信道质量低于设计期间的预期时,可能会受到质量突然下降(数字悬崖)的影响。这个问题可以通过使用线性编码和传输(LCT)来解决,LCT是一种仅依赖线性算子的联合源和信道编码方案,允许实现与无线信道质量相称的重构每像素误差。在本文中,我们提出了CV-Cast:第一个针对计算机视觉任务精度而不是逐像素失真进行优化的LCT方案。使用这种方法,例如在10 dB信道信噪比下,CV-Cast在语义分割方面需要比基线LCT方案少传输28%的符号,在目标检测任务方面需要比基线LCT方案少传输15%的符号。涉及现实5G信道模型的仿真证实了CV-Cast实现的精度平稳下降,而使用JPEG或学习图像编码(LIC)编码并使用低Eb/N0经典方案传输的图像会受到数字悬崖的影响。
{"title":"CV-Cast: Computer Vision–Oriented Linear Coding and Transmission","authors":"Jakub Žádník;Michel Kieffer;Anthony Trioux;Markku Mäkitalo;Pekka Jääskeläinen","doi":"10.1109/TMC.2024.3478048","DOIUrl":"https://doi.org/10.1109/TMC.2024.3478048","url":null,"abstract":"Remote inference allows lightweight edge devices, such as autonomous drones, to perform vision tasks exceeding their computational, energy, or processing delay budget. In such applications, reliable transmission of information is challenging due to high variations of channel quality. Traditional approaches involving spatio-temporal transforms, quantization, and entropy coding followed by digital transmission may be affected by a sudden decrease in quality (the \u0000<italic>digital cliff</i>\u0000) when the channel quality is less than expected during design. This problem can be addressed by using Linear Coding and Transmission (LCT), a joint source and channel coding scheme relying on linear operators only, allowing to achieve reconstructed per-pixel error commensurate with the wireless channel quality. In this paper, we propose CV-Cast: the first LCT scheme optimized for computer vision task accuracy instead of per-pixel distortion. Using this approach, for instance at 10 dB channel signal-to-noise ratio, CV-Cast requires transmitting 28% less symbols than a baseline LCT scheme in semantic segmentation and 15% in object detection tasks. Simulations involving a realistic 5G channel model confirm the smooth decrease in accuracy achieved with CV-Cast, while images encoded by JPEG or learned image coding (LIC) and transmitted using classical schemes at low Eb/N0 are subject to digital cliff.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"1149-1162"},"PeriodicalIF":7.7,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10719663","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AdaWiFi, Collaborative WiFi Sensing for Cross-Environment Adaptation AdaWiFi,协同WiFi感知跨环境适应
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-14 DOI: 10.1109/TMC.2024.3474853
Naiyu Zheng;Yuanchun Li;Shiqi Jiang;Yuanzhe Li;Rongchun Yao;Chuchu Dong;Ting Chen;Yubo Yang;Zhimeng Yin;Yunxin Liu
Deep learning (DL) based Wi-Fi sensing has witnessed great development in recent years. Although decent results have been achieved in certain scenarios, Wi-Fi based activity recognition is still difficult to deploy in real smart homes due to the limited cross-environment adaptability, i.e. a well-trained Wi-Fi sensing neural network in one environment is hard to adapt to other environments. To address this challenge, we propose AdaWiFi, a DL-based Wi-Fi sensing framework that allows multiple Internet-of-Things (IoT) devices to collaborate and adapt to various environments effectively. The key innovation of AdaWiFi includes a collective sensing model architecture that utilizes complementary information between distinct devices and avoids the biased perception of individual sensors and an accompanying model adaptation technique that can transfer the sensing model to new environments with limited data. We evaluate our system on a public dataset and a custom dataset collected from three complex sensing environments. The results demonstrate that AdaWiFi is able to achieve significantly better sensing adaptation effectiveness (e.g. 30% higher accuracy with one-shot adaptation) as compared with state-of-the-art baselines.
基于深度学习(DL)的Wi-Fi传感技术近年来取得了很大的发展。尽管在某些场景下取得了不错的效果,但由于跨环境适应性有限,基于Wi-Fi的活动识别仍然难以部署在真实的智能家居中,即在一种环境中训练有素的Wi-Fi传感神经网络很难适应其他环境。为了应对这一挑战,我们提出了AdaWiFi,这是一种基于dl的Wi-Fi传感框架,允许多个物联网(IoT)设备有效地协作和适应各种环境。AdaWiFi的关键创新包括利用不同设备之间的互补信息,避免单个传感器的偏见感知的集体传感模型架构,以及伴随的模型适应技术,可以将传感模型转移到数据有限的新环境中。我们在公共数据集和自定义数据集上评估了我们的系统,这些数据集来自三个复杂的传感环境。结果表明,与最先进的基线相比,AdaWiFi能够实现更好的传感自适应效率(例如,单次自适应的精度提高30%)。
{"title":"AdaWiFi, Collaborative WiFi Sensing for Cross-Environment Adaptation","authors":"Naiyu Zheng;Yuanchun Li;Shiqi Jiang;Yuanzhe Li;Rongchun Yao;Chuchu Dong;Ting Chen;Yubo Yang;Zhimeng Yin;Yunxin Liu","doi":"10.1109/TMC.2024.3474853","DOIUrl":"https://doi.org/10.1109/TMC.2024.3474853","url":null,"abstract":"Deep learning (DL) based Wi-Fi sensing has witnessed great development in recent years. Although decent results have been achieved in certain scenarios, Wi-Fi based activity recognition is still difficult to deploy in real smart homes due to the limited cross-environment adaptability, i.e. a well-trained Wi-Fi sensing neural network in one environment is hard to adapt to other environments. To address this challenge, we propose \u0000<sc>AdaWiFi</small>\u0000, a DL-based Wi-Fi sensing framework that allows multiple Internet-of-Things (IoT) devices to collaborate and adapt to various environments effectively. The key innovation of \u0000<sc>AdaWiFi</small>\u0000 includes a collective sensing model architecture that utilizes complementary information between distinct devices and avoids the biased perception of individual sensors and an accompanying model adaptation technique that can transfer the sensing model to new environments with limited data. We evaluate our system on a public dataset and a custom dataset collected from three complex sensing environments. The results demonstrate that \u0000<sc>AdaWiFi</small>\u0000 is able to achieve significantly better sensing adaptation effectiveness (e.g. 30% higher accuracy with one-shot adaptation) as compared with state-of-the-art baselines.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"845-858"},"PeriodicalIF":7.7,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handling Failures in Secondary Radio Access Failure Handling in Operational 5G Networks 运营5G网络无线二次接入故障处理中的故障处理
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-10 DOI: 10.1109/TMC.2024.3477462
Yanbing Liu;Chunyi Peng
In this work, we conduct a measurement study with three US operators to reveal three types of problematic failure handling on secondary radio access which have not been reported before. Compared to primary radio access failures, secondary radio access failures do not hurt radio access availability but significantly impact data performance, particularly when 5G is used as secondary radio access to boost throughput. Improper failure handling results in significant throughput loss, which is unnecessary in most instances. We then pinpoint the root causes behind these three types of problematic failure handling. When 5G provides higher throughput, failures are more likely to be falsely triggered by a specific event, causing the User Equipment (UE) to unnecessarily lose well-performing 5G connections. Moreover, after failures, the recovery of secondary radio access may fail due to inconsistent parameter settings or be delayed due to missing specific signaling fields. To address these issues, we propose SCGFailure Manager (SFM), a solution to optimize the detection and recovery of secondary radio access failures. Our evaluation results demonstrate that SFM can effectively avoid 60%-80% of problematic failure handling and double throughput in more than half of failure instances.
在这项工作中,我们与三家美国运营商进行了一项测量研究,以揭示三种类型的有问题的故障处理,这在以前没有报道过。与主要无线电接入故障相比,次要无线电接入故障不会损害无线电接入的可用性,但会显著影响数据性能,特别是当5G用作次要无线电接入以提高吞吐量时。错误的故障处理会导致大量的吞吐量损失,这在大多数情况下是不必要的。然后,我们查明这三种类型的问题故障处理背后的根本原因。当5G提供更高的吞吐量时,故障更有可能被特定事件错误触发,导致用户设备(UE)不必要地失去性能良好的5G连接。此外,在故障发生后,由于参数设置不一致,或者由于缺少特定的信令字段,可能会导致无线二次接入恢复失败。为了解决这些问题,我们提出了SCGFailure Manager (SFM),这是一种优化二次无线接入故障检测和恢复的解决方案。我们的评估结果表明,SFM可以有效地避免60%-80%的有问题的故障处理,并在一半以上的故障实例中提高吞吐量。
{"title":"Handling Failures in Secondary Radio Access Failure Handling in Operational 5G Networks","authors":"Yanbing Liu;Chunyi Peng","doi":"10.1109/TMC.2024.3477462","DOIUrl":"https://doi.org/10.1109/TMC.2024.3477462","url":null,"abstract":"In this work, we conduct a measurement study with three US operators to reveal three types of problematic failure handling on secondary radio access which have not been reported before. Compared to primary radio access failures, secondary radio access failures do not hurt radio access availability but significantly impact data performance, particularly when 5G is used as secondary radio access to boost throughput. Improper failure handling results in significant throughput loss, which is unnecessary in most instances. We then pinpoint the root causes behind these three types of problematic failure handling. When 5G provides higher throughput, failures are more likely to be falsely triggered by a specific event, causing the User Equipment (UE) to unnecessarily lose well-performing 5G connections. Moreover, after failures, the recovery of secondary radio access may fail due to inconsistent parameter settings or be delayed due to missing specific signaling fields. To address these issues, we propose SCGFailure Manager (\u0000<sc>SFM</small>\u0000), a solution to optimize the detection and recovery of secondary radio access failures. Our evaluation results demonstrate that \u0000<sc>SFM</small>\u0000 can effectively avoid 60%-80% of problematic failure handling and double throughput in more than half of failure instances.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"956-969"},"PeriodicalIF":7.7,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BIT-FL: Blockchain-Enabled Incentivized and Secure Federated Learning Framework BIT-FL:基于区块链的激励和安全的联邦学习框架
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-10 DOI: 10.1109/TMC.2024.3477616
Chenhao Ying;Fuyuan Xia;David S. L. Wei;Xinchun Yu;Yibin Xu;Weiting Zhang;Xikun Jiang;Haiming Jin;Yuan Luo;Tao Zhang;Dacheng Tao
Harnessing the benefits of blockchain, such as decentralization, immutability, and transparency, to bolster the credibility and security attributes of federated learning (FL) has garnered increasing attention. However, blockchain-enabled FL (BFL) still faces several challenges. The primary and most significant issue arises from its essential but slow validation procedure, which selects high-quality local models by recruiting distributed validators. The second issue stems from its incentive mechanism under the transparent nature of blockchain, increasing the risk of privacy breaches regarding workers’ cost information. The final challenge involves data eavesdropping from shared local models. To address these significant obstacles, this paper proposes a Blockchain-enabled Incentivized and Secure Federated Learning (BIT-FL) framework. BIT-FL leverages a novel loop-based sharded consensus algorithm to accelerate the validation procedure, ensuring the same security as non-sharded consensus protocols. It consistently outputs the correct local model selection when the fraction of adversaries among validators is less than $1/2$ with synchronous communication. Furthermore, BIT-FL integrates a randomized incentive procedure, attracting more participants while guaranteeing the privacy of their cost information through meticulous worker selection probability design. Finally, by adding artificial Gaussian noise to local models, it ensures the privacy of trainers’ local models. With the careful design of Gaussian noise, the excess empirical risk of BIT-FL is upper-bounded by $mathcal {O}(frac{ln n_{min}}{ n_{min}^{3/2}}+frac{ln n}{n})$, where $n$ represents the size of the union dataset, and $n_{{min}}$ represents the size of the smallest dataset. Our extensive experiments demonstrate that BIT-FL exhibits efficiency, robustness, and high accuracy for both classification and regression tasks.
利用区块链的优势(如去中心化、不变性和透明性)来增强联邦学习(FL)的可信度和安全性已经引起了越来越多的关注。然而,支持区块链的FL (BFL)仍然面临着一些挑战。主要和最重要的问题来自于它的基本但缓慢的验证过程,该过程通过招募分布式验证器来选择高质量的局部模型。第二个问题源于b区块链透明性质下的激励机制,增加了员工成本信息隐私泄露的风险。最后一个挑战涉及从共享的本地模型中窃听数据。为了解决这些重大障碍,本文提出了一个支持区块链的激励和安全联邦学习(BIT-FL)框架。BIT-FL利用一种新颖的基于循环的分片共识算法来加速验证过程,确保与非分片共识协议相同的安全性。使用同步通信,当验证器中的对手的比例小于$1/2$时,它始终输出正确的本地模型选择。此外,BIT-FL整合了随机激励程序,通过细致的工人选择概率设计,在吸引更多参与者的同时保证其成本信息的隐私性。最后,通过在局部模型中加入人工高斯噪声,保证了训练器局部模型的私密性。通过对高斯噪声的精心设计,BIT-FL的超额经验风险上限为$mathcal {O}(frac{ln n_{min}}{ n_{min}^{3/2}}+frac{ln n}{n})$,其中$n$表示联合数据集的大小,$n_{{min}}$表示最小数据集的大小。我们的大量实验表明,BIT-FL在分类和回归任务中都表现出高效率、鲁棒性和高精度。
{"title":"BIT-FL: Blockchain-Enabled Incentivized and Secure Federated Learning Framework","authors":"Chenhao Ying;Fuyuan Xia;David S. L. Wei;Xinchun Yu;Yibin Xu;Weiting Zhang;Xikun Jiang;Haiming Jin;Yuan Luo;Tao Zhang;Dacheng Tao","doi":"10.1109/TMC.2024.3477616","DOIUrl":"https://doi.org/10.1109/TMC.2024.3477616","url":null,"abstract":"Harnessing the benefits of blockchain, such as decentralization, immutability, and transparency, to bolster the credibility and security attributes of federated learning (FL) has garnered increasing attention. However, blockchain-enabled FL (BFL) still faces several challenges. The primary and most significant issue arises from its essential but slow validation procedure, which selects high-quality local models by recruiting distributed validators. The second issue stems from its incentive mechanism under the transparent nature of blockchain, increasing the risk of privacy breaches regarding workers’ cost information. The final challenge involves data eavesdropping from shared local models. To address these significant obstacles, this paper proposes a Blockchain-enabled Incentivized and Secure Federated Learning (BIT-FL) framework. BIT-FL leverages a novel loop-based sharded consensus algorithm to accelerate the validation procedure, ensuring the same security as non-sharded consensus protocols. It consistently outputs the correct local model selection when the fraction of adversaries among validators is less than \u0000<inline-formula><tex-math>$1/2$</tex-math></inline-formula>\u0000 with synchronous communication. Furthermore, BIT-FL integrates a randomized incentive procedure, attracting more participants while guaranteeing the privacy of their cost information through meticulous worker selection probability design. Finally, by adding artificial Gaussian noise to local models, it ensures the privacy of trainers’ local models. With the careful design of Gaussian noise, the excess empirical risk of BIT-FL is upper-bounded by \u0000<inline-formula><tex-math>$mathcal {O}(frac{ln n_{min}}{ n_{min}^{3/2}}+frac{ln n}{n})$</tex-math></inline-formula>\u0000, where \u0000<inline-formula><tex-math>$n$</tex-math></inline-formula>\u0000 represents the size of the union dataset, and \u0000<inline-formula><tex-math>$n_{{min}}$</tex-math></inline-formula>\u0000 represents the size of the smallest dataset. Our extensive experiments demonstrate that BIT-FL exhibits efficiency, robustness, and high accuracy for both classification and regression tasks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"1212-1229"},"PeriodicalIF":7.7,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource Collaboration Between Satellite and Wide-Area Mobile Base Stations in Integrated Satellite-Terrestrial Network 星地融合网络中卫星与广域移动基站的资源协同
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-09 DOI: 10.1109/TMC.2024.3472081
Zhen Li;Chunxiao Jiang;Jiachen Sun;Jianhua Lu
The integrated satellite-terrestrial network with cascaded downlinks from satellites to wide-area mobile base stations and subsequently to terrestrial users enables global communication for terrestrial 4G/5G cellular users and is widely used in emergency rescue scenarios. However, in this network, satellites and wide-area mobile base stations are controlled by distinct resource scheduling systems with disparate packet queues, which means resources allocated by the satellite to the wide-area mobile base stations may not match the resources allocated by the wide-area mobile base stations to the terrestrial users, leading to coordination inefficiencies and resource wastage. To tackle this challenge, a resource collaborative scheduling mechanism based on cooperative game theory for cascaded downlinks is established, which effectively adapts to distinct resource scheduling systems with various QoS constraints. Then, the utility function of the Nash product is converted into a max-min problem, and a convex transformation method is proposed for the non-convex optimization problem. Simulation results demonstrate that the proposed collaborative scheduling mechanism effectively improves resource utilization and the transmission rate of cascaded downlinks.
卫星-地面一体化网络具有从卫星到广域移动基站并随后到地面用户的级联下行链路,可为地面4G/5G蜂窝用户实现全球通信,并广泛用于应急救援场景。然而,在该网络中,卫星和广域移动基站由不同的资源调度系统控制,具有不同的分组队列,这意味着卫星分配给广域移动基站的资源可能与广域移动基站分配给地面用户的资源不匹配,导致协调效率低下和资源浪费。针对这一挑战,建立了一种基于合作博弈论的级联下行链路资源协同调度机制,该机制能有效适应具有不同QoS约束的不同资源调度系统。然后,将纳什积的效用函数转化为极大极小问题,并针对非凸优化问题提出了一种凸变换方法。仿真结果表明,所提出的协同调度机制有效地提高了资源利用率和级联下行链路的传输速率。
{"title":"Resource Collaboration Between Satellite and Wide-Area Mobile Base Stations in Integrated Satellite-Terrestrial Network","authors":"Zhen Li;Chunxiao Jiang;Jiachen Sun;Jianhua Lu","doi":"10.1109/TMC.2024.3472081","DOIUrl":"https://doi.org/10.1109/TMC.2024.3472081","url":null,"abstract":"The integrated satellite-terrestrial network with cascaded downlinks from satellites to wide-area mobile base stations and subsequently to terrestrial users enables global communication for terrestrial 4G/5G cellular users and is widely used in emergency rescue scenarios. However, in this network, satellites and wide-area mobile base stations are controlled by distinct resource scheduling systems with disparate packet queues, which means resources allocated by the satellite to the wide-area mobile base stations may not match the resources allocated by the wide-area mobile base stations to the terrestrial users, leading to coordination inefficiencies and resource wastage. To tackle this challenge, a resource collaborative scheduling mechanism based on cooperative game theory for cascaded downlinks is established, which effectively adapts to distinct resource scheduling systems with various QoS constraints. Then, the utility function of the Nash product is converted into a max-min problem, and a convex transformation method is proposed for the non-convex optimization problem. Simulation results demonstrate that the proposed collaborative scheduling mechanism effectively improves resource utilization and the transmission rate of cascaded downlinks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"875-889"},"PeriodicalIF":7.7,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AS-MAC: An Adaptive Scheduling MAC Protocol for Reducing the End-to-End Delay in AUV-Assisted Underwater Acoustic Networks AS-MAC:一种减少auv辅助水声网络端到端时延的自适应调度MAC协议
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-07 DOI: 10.1109/TMC.2024.3475428
Jiani Guo;Shanshan Song;Jun Liu;Miao Pan;Jun-Hong Cui;GuangJie Han
Autonomous Underwater Vehicle (AUV)-assisted Underwater Acoustic Networks (UANs) are promising for complex ocean applications. In essence, an AUV-assisted UAN is still dominated by fixed nodes, and Time Division Multiple Access (TDMA)-based Medium Access Control (MAC) protocols have undisputed practicability in such fixed nodes-dominated UANs since they are simple and easy to deploy. However, AUV-assisted UANs may exist dynamic bidirectional data streams, while most existing protocols assume UANs have a unidirectional data stream, and their fixed scheduling sequence results in the long end-to-end delay in AUV-assisted UANs. In this paper, we first reveal a phenomenon between the data stream and the scheduling sequence, derived from real-world experiments: their consistent direction decreases the packet waiting delay but increases the slot length, and vice versa. To optimize the end-to-end delay, UANs with dynamic bidirectional data streams expect the MAC protocol to provide a flexible scheduling sequence. To this end, we propose a low-delay Adaptive Scheduling MAC protocol (AS-MAC) based on TDMA for AUV-assisted UANs. In AS-MAC, we analyze the relationship between scheduling sequence and data stream, extracting two significant factors: slot length and packet delay. Afterwards, we design Slot Length Model (SLM) and Packet Delay Model (PDM) to analyze the end-to-end delay of different data streams. Based on these two models, we present a Scheduling Sequence and Slot Length allocation Algorithm (SSSLA) to adaptively provide the minimum end-to-end delay for current bidirectional data streams. Extensive simulation results show that AS-MAC efficiently addresses severe queue congestion of the state-of-the-art protocols and reduces the end-to-end delay of different dynamic streams in various scenarios.
自主水下航行器(AUV)辅助水声网络(UANs)在复杂的海洋应用中具有广阔的应用前景。从本质上讲,auv辅助的UAN仍然由固定节点主导,而基于时分多址(TDMA)的介质访问控制(MAC)协议由于其简单易部署,在这种固定节点主导的UAN中具有无可争议的实用性。然而,AUV-assisted UANs可能存在动态的双向数据流,而现有的协议大多假设UANs具有单向数据流,其固定的调度顺序导致AUV-assisted UANs存在端到端较长的时延。在本文中,我们首先揭示了数据流和调度序列之间的一个现象:它们的一致方向减少了数据包等待延迟,但增加了插槽长度,反之亦然。为了优化端到端时延,具有动态双向数据流的广域网希望MAC协议提供灵活的调度顺序。为此,我们提出了一种基于TDMA的低延迟自适应调度MAC协议(AS-MAC)。在AS-MAC中,我们分析了调度序列与数据流之间的关系,提取了两个重要因素:插槽长度和数据包延迟。然后,我们设计了槽长度模型(SLM)和包延迟模型(PDM)来分析不同数据流的端到端延迟。基于这两个模型,我们提出了一种调度序列和插槽长度分配算法(SSSLA),以自适应地为当前双向数据流提供最小的端到端延迟。大量的仿真结果表明,AS-MAC有效地解决了当前协议严重的队列拥塞问题,并降低了不同场景下不同动态流的端到端延迟。
{"title":"AS-MAC: An Adaptive Scheduling MAC Protocol for Reducing the End-to-End Delay in AUV-Assisted Underwater Acoustic Networks","authors":"Jiani Guo;Shanshan Song;Jun Liu;Miao Pan;Jun-Hong Cui;GuangJie Han","doi":"10.1109/TMC.2024.3475428","DOIUrl":"https://doi.org/10.1109/TMC.2024.3475428","url":null,"abstract":"Autonomous Underwater Vehicle (AUV)-assisted Underwater Acoustic Networks (UANs) are promising for complex ocean applications. In essence, an AUV-assisted UAN is still dominated by fixed nodes, and Time Division Multiple Access (TDMA)-based Medium Access Control (MAC) protocols have undisputed practicability in such fixed nodes-dominated UANs since they are simple and easy to deploy. However, AUV-assisted UANs may exist dynamic bidirectional data streams, while most existing protocols assume UANs have a unidirectional data stream, and their fixed scheduling sequence results in the long end-to-end delay in AUV-assisted UANs. In this paper, we first reveal a phenomenon between the data stream and the scheduling sequence, derived from real-world experiments: their consistent direction decreases the packet waiting delay but increases the slot length, and vice versa. To optimize the end-to-end delay, UANs with dynamic bidirectional data streams expect the MAC protocol to provide a flexible scheduling sequence. To this end, we propose a low-delay Adaptive Scheduling MAC protocol (AS-MAC) based on TDMA for AUV-assisted UANs. In AS-MAC, we analyze the relationship between scheduling sequence and data stream, extracting two significant factors: slot length and packet delay. Afterwards, we design Slot Length Model (SLM) and Packet Delay Model (PDM) to analyze the end-to-end delay of different data streams. Based on these two models, we present a Scheduling Sequence and Slot Length allocation Algorithm (SSSLA) to adaptively provide the minimum end-to-end delay for current bidirectional data streams. Extensive simulation results show that AS-MAC efficiently addresses severe queue congestion of the state-of-the-art protocols and reduces the end-to-end delay of different dynamic streams in various scenarios.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"1197-1211"},"PeriodicalIF":7.7,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Adaptive Light-Weight Deep Learning (AppAdapt-LWDL) Framework for Enabling Edge Intelligence in Dairy Processing 应用自适应轻量级深度学习(AppAdapt-LWDL)框架在乳制品加工中实现边缘智能
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-07 DOI: 10.1109/TMC.2024.3475634
Rahul Umesh Mhapsekar;Lizy Abraham;Steven Davy;Indrakshi Dey
The dairy industry is experiencing a surge in data from Edge devices, using spectroscopic techniques for milk quality assessment. Milk spectral data can help understand the species of milk producer and detect inter-species adulteration. Transmitting raw milk spectral data to the cloud for processing faces challenges due to limited network resources such as bandwidth, computational memory, and energy availability. Edge processing offers a solution by training data closer to the source, enhancing efficiency and real-time analysis by providing reduced latency, improved accuracy, resource-aware computation, and real-time customization. However, traditional Deep Learning (DL) methods such as Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) struggle on resource-constrained Edge devices due to complexity. To address this, we propose an Edge-Centric Application-Adaptive Light-Weight DL approach (AppAdapt-LWDL) for milk species identification and adulteration detection. Our method optimizes DL models via double model optimization, involving low-magnitude pruning and post-training quantization. Our novel application-adaptive algorithm balances speed and accuracy by determining the pruning ratio automatically for the specific application. The chosen model is then quantized for smaller databases, ideal for embedded devices. The AppAdapt-LWDL framework significantly accelerates training, speeds up inferencing, enhances energy efficiency, and maintains accuracy based on application needs.
乳制品行业正在经历来自Edge设备的数据激增,这些设备使用光谱技术进行牛奶质量评估。牛奶光谱数据可以帮助了解牛奶生产者的种类和检测种间掺假。由于带宽、计算内存和能源可用性等网络资源有限,将原料牛奶光谱数据传输到云端进行处理面临挑战。边缘处理提供了一种解决方案,通过更接近源的方式训练数据,通过减少延迟、提高准确性、资源感知计算和实时定制来提高效率和实时分析。然而,传统的深度学习(DL)方法,如卷积神经网络(cnn)和循环神经网络(rnn)由于复杂性在资源受限的边缘设备上挣扎。为了解决这个问题,我们提出了一种以边缘为中心的应用自适应轻量级DL方法(AppAdapt-LWDL),用于牛奶种类识别和掺假检测。我们的方法通过双模型优化来优化DL模型,包括低幅度修剪和训练后量化。我们的新应用自适应算法通过自动确定特定应用的剪枝比来平衡速度和准确性。然后将所选模型量化到较小的数据库中,这是嵌入式设备的理想选择。AppAdapt-LWDL框架显著加快了训练速度,加快了推理速度,提高了能源效率,并保持了基于应用程序需求的准确性。
{"title":"Application Adaptive Light-Weight Deep Learning (AppAdapt-LWDL) Framework for Enabling Edge Intelligence in Dairy Processing","authors":"Rahul Umesh Mhapsekar;Lizy Abraham;Steven Davy;Indrakshi Dey","doi":"10.1109/TMC.2024.3475634","DOIUrl":"https://doi.org/10.1109/TMC.2024.3475634","url":null,"abstract":"The dairy industry is experiencing a surge in data from Edge devices, using spectroscopic techniques for milk quality assessment. Milk spectral data can help understand the species of milk producer and detect inter-species adulteration. Transmitting raw milk spectral data to the cloud for processing faces challenges due to limited network resources such as bandwidth, computational memory, and energy availability. Edge processing offers a solution by training data closer to the source, enhancing efficiency and real-time analysis by providing reduced latency, improved accuracy, resource-aware computation, and real-time customization. However, traditional Deep Learning (DL) methods such as Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) struggle on resource-constrained Edge devices due to complexity. To address this, we propose an Edge-Centric Application-Adaptive Light-Weight DL approach (AppAdapt-LWDL) for milk species identification and adulteration detection. Our method optimizes DL models via double model optimization, involving low-magnitude pruning and post-training quantization. Our novel application-adaptive algorithm balances speed and accuracy by determining the pruning ratio automatically for the specific application. The chosen model is then quantized for smaller databases, ideal for embedded devices. The AppAdapt-LWDL framework significantly accelerates training, speeds up inferencing, enhances energy efficiency, and maintains accuracy based on application needs.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"1105-1119"},"PeriodicalIF":7.7,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TRIMP: Three-Sided Stable Matching for Distributed Vehicle Sharing System Using Stackelberg Game 基于Stackelberg博弈的分布式车辆共享系统的三面稳定匹配
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-07 DOI: 10.1109/TMC.2024.3475481
Yang Xu;Shanshan Zhang;Chen Lyu;Jia Liu;Tarik Taleb;Shiratori Norio
Distributed Vehicle Sharing System (DVSS) leverages emerging technologies such as blockchain to create a secure, transparent, and efficient platform for sharing vehicles. In such a system, both efficient matching of users with available vehicles and optimal pricing mechanisms play crucial roles in maximizing system revenue. However, most existing schemes utilize user-to-vehicle (two-sided) matching and pricing, which are unrealistic for DVSS due to the lack of participation of service providers. To address this issue, we propose in this paper a novel Three-sided stable Matching with an optimal Pricing (TRIMP) scheme. First, to achieve maximum utilities for all three parties simultaneously, we formulate the optimal policy and pricing problem as a three-stage Stackelberg game and derive its equilibrium points accordingly. Second, relying on these solutions from the Stackelberg game, we construct a three-sided cyclic matching for DVSS. Third, as the existence of such a matching is NP-complete, we design a specific vehicle sharing algorithm to realize stable matching. Extensive experiments demonstrate the effectiveness of our TRIMP scheme, which optimizes the matching process and ensures efficient resource allocation, leading to a more stable and well-functioning decentralized vehicle sharing ecosystem.
分布式车辆共享系统(DVSS)利用区块链等新兴技术,为共享车辆创建一个安全、透明、高效的平台。在此系统中,用户与可用车辆的有效匹配和最优定价机制对系统收益最大化起着至关重要的作用。然而,大多数现有方案采用用户对车辆(双边)匹配和定价,由于缺乏服务提供商的参与,这对于DVSS来说是不现实的。为了解决这一问题,本文提出了一种新的具有最优定价的三面稳定匹配(TRIMP)方案。首先,为了使三方同时获得最大效用,我们将最优政策和定价问题制定为三阶段Stackelberg博弈,并推导出其均衡点。其次,基于这些Stackelberg博弈的解,构造了DVSS的三面循环匹配。第三,由于这种匹配的存在性是np完全的,我们设计了一种特定的车辆共享算法来实现稳定匹配。大量的实验证明了我们的TRIMP方案的有效性,该方案优化了匹配过程,确保了有效的资源分配,从而形成了一个更加稳定和运行良好的分散式汽车共享生态系统。
{"title":"TRIMP: Three-Sided Stable Matching for Distributed Vehicle Sharing System Using Stackelberg Game","authors":"Yang Xu;Shanshan Zhang;Chen Lyu;Jia Liu;Tarik Taleb;Shiratori Norio","doi":"10.1109/TMC.2024.3475481","DOIUrl":"https://doi.org/10.1109/TMC.2024.3475481","url":null,"abstract":"Distributed Vehicle Sharing System (DVSS) leverages emerging technologies such as blockchain to create a secure, transparent, and efficient platform for sharing vehicles. In such a system, both efficient matching of users with available vehicles and optimal pricing mechanisms play crucial roles in maximizing system revenue. However, most existing schemes utilize user-to-vehicle (two-sided) matching and pricing, which are unrealistic for DVSS due to the lack of participation of service providers. To address this issue, we propose in this paper a novel Three-sided stable Matching with an optimal Pricing (TRIMP) scheme. First, to achieve maximum utilities for all three parties simultaneously, we formulate the optimal policy and pricing problem as a three-stage Stackelberg game and derive its equilibrium points accordingly. Second, relying on these solutions from the Stackelberg game, we construct a three-sided cyclic matching for DVSS. Third, as the existence of such a matching is NP-complete, we design a specific vehicle sharing algorithm to realize stable matching. Extensive experiments demonstrate the effectiveness of our TRIMP scheme, which optimizes the matching process and ensures efficient resource allocation, leading to a more stable and well-functioning decentralized vehicle sharing ecosystem.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"1132-1148"},"PeriodicalIF":7.7,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1