2016
DOI: 10.1109/tvt.2015.2472289
|View full text |Cite
|
Sign up to set email alerts
|

A Game Theoretical Incentive Scheme for Relay Selection Services in Mobile Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
42
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 126 publications
(43 citation statements)
references
References 35 publications
1
42
0
Order By: Relevance
“…The users are encouraged to forward and receive packets with the incentive to increase their coins. Existing work [42][43][44][45] has proved this mechanism is effective in crowdsourcing tasks and ad hoc networks. However, they are not suitable for the privacy-preserving requirements of vehicular announcement networks.…”
Section: A Basic Ideamentioning
confidence: 99%
“…The users are encouraged to forward and receive packets with the incentive to increase their coins. Existing work [42][43][44][45] has proved this mechanism is effective in crowdsourcing tasks and ad hoc networks. However, they are not suitable for the privacy-preserving requirements of vehicular announcement networks.…”
Section: A Basic Ideamentioning
confidence: 99%
“…Like many incentive‐based mechanisms such as Xu et al and Wang et al, we assume also that a node participating in messages forwarding is stimulated through some reward/payment and there is a virtual currency to organize the payments among nodes. All payment transactions are conducted through a Credit Clearance Center (CCC), which is accessible to the network nodes, eg, through the Internet . Each node has an account in the CCC, and each transaction should be processed by the CCC.…”
Section: System Model and Assumptionsmentioning
confidence: 99%
“…Most of these approaches have been widely used for financial modeling which try to identify ML patterns by different techniques such as support vector machine [12], correlation analysis [13], neural network [14], etc. It is known that the Markov model is widely used in wireless communication [15][16][17][18] and cloud computing [19][20][21][22], but none of these works addressed AML resources allocation issue based on a reward model, considering prioritized suspicious transaction reports. In order to well capture the dynamic suspicious transaction reports arrivals and departures in the AML resource allocation domain, in this paper, we use Semi-Markov Decision Process (SMDP) which belongs to Markov model to set up our proposed Adaptive AML Resource Allocation Model (AAMLRAM).…”
Section: Related Workmentioning
confidence: 99%
“…From the reward function (18) and probability Eqs. 14, 15 and 16, the expected total discounted reward ν(s) at state s ∈ S is related with the arrival rates of HRO suspicious transaction report (λ h ) and L/MRO suspicious transaction report (λ l ), the mean processing rate for a suspicious transaction report of each allocation scheme ( μ ξ(c) ) , the occupied AML resource expressed by the number of being occupied AMLRAUs (s c * c) and K are fixed.…”
Section: Performance Analysismentioning
confidence: 99%