Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2011 Proceedings IEEE INFOCOM 2011
DOI: 10.1109/infcom.2011.5935225
|View full text |Cite
|
Sign up to set email alerts
|

Optimizing information credibility in social swarming applications

Abstract: With the advent of smartphone technology, it has become possible to conceive of entirely new classes of applications. Social swarming, in which users armed with smartphones are directed by a central director to report on events in the physical world, has several real-world applications: search and rescue, coordinated fire-fighting, and the DARPA balloon hunt challenge. In this paper, we focus on the following problem: how does the director optimize the selection of reporters to deliver credible corroborating i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
11
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 26 publications
1
11
0
Order By: Relevance
“…However, because the above vector is on the boundary of R, a simple extension of Caratheodory's theorem ensures it can be written using at most K +1 non-zero θ m values. 2 This proves Theorem 1.…”
Section: Appendix a -Proof Of Theoremsupporting
confidence: 60%
See 2 more Smart Citations
“…However, because the above vector is on the boundary of R, a simple extension of Caratheodory's theorem ensures it can be written using at most K +1 non-zero θ m values. 2 This proves Theorem 1.…”
Section: Appendix a -Proof Of Theoremsupporting
confidence: 60%
“…The goal is to make distributed decisions that maximize time average quality of information. This scenario was previously considered by Liu et al in [2]. There, sensors can provide reports every slot t using one of multiple reporting formats, such as text, image, or video.…”
Section: A Applications To Sensor Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…In medium access control problem [9], users set their individual channel access probability to maximize their benefit. In wireless sensor networks, sensor nodes collect information to serve a fusion center, an interesting problem is to make each node independently decide the quality of its report to maximize the average quality of information gathered by the fusion center subject to some power constraint [10], [11], note that a higher level of quality requires higher power consumption. This paper considers an optimization problem in a distributed network where each node adjusts its own action to maximize the global utility of the system, which is also perturbed by a stochastic process, e.g., wireless channels.…”
Section: Introductionmentioning
confidence: 99%
“…More recently, quality metrics of accuracy and credibility are considered in [9], [10] using simplified models that do not consider the actual dynamics of a wireless network.…”
Section: Introductionmentioning
confidence: 99%