开发与对抗:众包的可持续性分析

IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Transactions on Mobile Computing Pub Date : 2024-09-18 DOI:10.1109/TMC.2024.3463417
Hang Zhao;Shengling Wang;Hongwei Shi;Jianhui Huang;Yu Guo;Xiuzhen Cheng
{"title":"开发与对抗:众包的可持续性分析","authors":"Hang Zhao;Shengling Wang;Hongwei Shi;Jianhui Huang;Yu Guo;Xiuzhen Cheng","doi":"10.1109/TMC.2024.3463417","DOIUrl":null,"url":null,"abstract":"Game theory is an effective analytical tool for crowdsourcing. Existing studies based on it share a commonality: the influence of players’ decisions is \n<italic>bilateral</i>\n. However, the status is broken by the zero-determinant (ZD) strategy, where the ZD player can \n<italic>unilaterally</i>\n control the opponent's expected payoff. Thereby, crowdsourcing games trigger conclusions that differ from traditional ones. By addressing three questions, this paper is the first work to analyze the turbulence in crowdsourcing caused by the inequality between the requestor and the worker in the ZD game. The first question reveals the potential for the requestor to exploit the worker; the second question quantifies the worker's tolerance towards exploitation, providing a basis for confrontation; the third question serves as the cornerstone for maintaining the crowdsourcing, regulating the requestor's exploitative behavior. To answer these questions, we extend ZD strategies from binary games to continuous ones, not only revealing the requestor's dominance but also enriching the theoretical system of ZD strategies and broadening their application. Furthermore, we introduce the worker's dissatisfaction degree, identifying the exponential trend and decay rate, revealing optimal timing and speed for the worker's effective confrontation and maximum exploitation for the requestor. Numerical simulations have validated the effectiveness of our analyses.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"614-626"},"PeriodicalIF":7.7000,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Exploitation and Confrontation: Sustainability Analysis of Crowdsourcing\",\"authors\":\"Hang Zhao;Shengling Wang;Hongwei Shi;Jianhui Huang;Yu Guo;Xiuzhen Cheng\",\"doi\":\"10.1109/TMC.2024.3463417\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Game theory is an effective analytical tool for crowdsourcing. Existing studies based on it share a commonality: the influence of players’ decisions is \\n<italic>bilateral</i>\\n. However, the status is broken by the zero-determinant (ZD) strategy, where the ZD player can \\n<italic>unilaterally</i>\\n control the opponent's expected payoff. Thereby, crowdsourcing games trigger conclusions that differ from traditional ones. By addressing three questions, this paper is the first work to analyze the turbulence in crowdsourcing caused by the inequality between the requestor and the worker in the ZD game. The first question reveals the potential for the requestor to exploit the worker; the second question quantifies the worker's tolerance towards exploitation, providing a basis for confrontation; the third question serves as the cornerstone for maintaining the crowdsourcing, regulating the requestor's exploitative behavior. To answer these questions, we extend ZD strategies from binary games to continuous ones, not only revealing the requestor's dominance but also enriching the theoretical system of ZD strategies and broadening their application. Furthermore, we introduce the worker's dissatisfaction degree, identifying the exponential trend and decay rate, revealing optimal timing and speed for the worker's effective confrontation and maximum exploitation for the requestor. Numerical simulations have validated the effectiveness of our analyses.\",\"PeriodicalId\":50389,\"journal\":{\"name\":\"IEEE Transactions on Mobile Computing\",\"volume\":\"24 2\",\"pages\":\"614-626\"},\"PeriodicalIF\":7.7000,\"publicationDate\":\"2024-09-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Mobile Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10682809/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Mobile Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10682809/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

博弈论是众包的有效分析工具。基于此的现有研究有一个共同点:玩家决策的影响是双向的。然而,这种状态被零决定策略(ZD)打破了,ZD玩家可以单方面控制对手的预期收益。因此,众包游戏会产生不同于传统游戏的结论。本文通过解决三个问题,首次分析了众包博弈中请求者与劳动者之间的不平等导致的众包动荡。第一个问题揭示了请求者利用工作者的可能性;第二个问题量化了工人对剥削的容忍程度,为对抗提供了基础;第三个问题是维持众包的基石,规范请求者的剥削行为。为了回答这些问题,我们将ZD策略从二元博弈扩展到连续博弈,不仅揭示了请求者的优势地位,而且丰富了ZD策略的理论体系,拓宽了其应用范围。此外,我们引入了员工的不满程度,确定了指数趋势和衰减率,揭示了员工有效对抗的最佳时间和速度,并为请求者提供了最大的利用。数值模拟验证了分析的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Exploitation and Confrontation: Sustainability Analysis of Crowdsourcing
Game theory is an effective analytical tool for crowdsourcing. Existing studies based on it share a commonality: the influence of players’ decisions is bilateral . However, the status is broken by the zero-determinant (ZD) strategy, where the ZD player can unilaterally control the opponent's expected payoff. Thereby, crowdsourcing games trigger conclusions that differ from traditional ones. By addressing three questions, this paper is the first work to analyze the turbulence in crowdsourcing caused by the inequality between the requestor and the worker in the ZD game. The first question reveals the potential for the requestor to exploit the worker; the second question quantifies the worker's tolerance towards exploitation, providing a basis for confrontation; the third question serves as the cornerstone for maintaining the crowdsourcing, regulating the requestor's exploitative behavior. To answer these questions, we extend ZD strategies from binary games to continuous ones, not only revealing the requestor's dominance but also enriching the theoretical system of ZD strategies and broadening their application. Furthermore, we introduce the worker's dissatisfaction degree, identifying the exponential trend and decay rate, revealing optimal timing and speed for the worker's effective confrontation and maximum exploitation for the requestor. Numerical simulations have validated the effectiveness of our analyses.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Mobile Computing
IEEE Transactions on Mobile Computing 工程技术-电信学
CiteScore
12.90
自引率
2.50%
发文量
403
审稿时长
6.6 months
期刊介绍: IEEE Transactions on Mobile Computing addresses key technical issues related to various aspects of mobile computing. This includes (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies. Topics of interest span a wide range, covering aspects like mobile networks and hosts, mobility management, multimedia, operating system support, power management, online and mobile environments, security, scalability, reliability, and emerging technologies such as wearable computers, body area networks, and wireless sensor networks. The journal serves as a comprehensive platform for advancements in mobile computing research.
期刊最新文献
Harmonizing Global and Local Class Imbalance for Federated Learning O-RAN-Enabled Intelligent Network Slicing to Meet Service-Level Agreement (SLA) CV-Cast: Computer Vision–Oriented Linear Coding and Transmission AdaWiFi, Collaborative WiFi Sensing for Cross-Environment Adaptation BIT-FL: Blockchain-Enabled Incentivized and Secure Federated Learning Framework
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1