Beschreibung
This book establishes game-theoretical frameworks based on the mechanism design theory and proposes strategy-proof algorithms, to optimally allocate and price the related IoT services, so that the social welfare of IoT ecosystem or the service providers revenue can be maximized and the IoT service provision can be sustainable. This book is written by experts based on the recent research results on the interaction between the service providers and users in the IoT system. Since the IoT networks are essentially supported by data, communication, and computing resources, the book focuses on three representative IoT services, including the data analytics services, the cloud/fog computing services for blockchain networks, and the wireless powered data crowdsourcing services. Researchers, scientists, and engineers in the field of resource allocation and service management for future IoT ecosystem can benefit from the book. As such, this book provides valuable insights and practical methods,especially the novel deep learning-based mechanism that can be considered in the emerging IoT technology.
Autorenportrait
Yutao Jiao received the Ph.D. degree in computer science and engineering from Nanyang Technological University, Singapore, in 2020. He is currently an assistant professor in the College of Communication Engineering, Army Engineering University of PLA, Nanjing, China. His research interests include algorithmic mechanism design, blockchain, distributed machine learning, as well as mobile crowdsourcing in the Internet of Things.
Ping Wang (Senior Member, IEEE) received the Ph.D. degree in electrical engineering from University of Waterloo, Canada, in 2008. Currently, she is an associate professor in the School of Computer Science and Engineering, Nanyang Technological University, Singapore. Her current research interests include resource allocation in multimedia wireless networks, cloud computing, and smart grid. She was a co-recipient of the Best Paper Award from IEEE Wireless Communications and Networking Conference (WCNC) 2012 and IEEE International Conference on Communications (ICC) 2007.
Dusit Niyato (Fellow, IEEE) received the B.E. degree from the King Mongkuks Institute of Technology Ladkrabang, Thailand, in 1999, and the Ph.D. degree in electrical and computer engineering from the University of Manitoba, Canada, in 2008. He is currently a professor in the School of Computer Science and Engineering and the School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore. He has published more than 380 technical papers in the area of wireless and mobile networking and is an inventor of four US and German patents. He has authored four books, including Game Theory in Wireless and Communication Networks: Theory, Models, and Applications (Cambridge University Press). He won the Best Young Researcher Award of IEEE Communications Society Asia Pacific and the 2011 IEEE Communications Society Fred W. Ellersick Prize Paper Award. He was named the 2017, 2018, and 2019 highly cited researcherin computer science. He is currently serving as a senior editor of IEEE WIRELESS COMMUNICATIONS LETTER, an area editor of the IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (Radio Management and Multiple Access) and the IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (Network and Service Management and Green Communication), and an editor of IEEE TRANSACTIONS ON COMMUNICATIONS, an associate editor of the IEEE TRANSACTIONS ON MOBILE COMPUTING, the IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, and the IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING. He was a guest editor of the IEEE JOURNAL ON SELECTED AREAS ON COMMUNICATIONS. He was a distinguished lecturer of the IEEE Communications Society from 2016 to 2017.
Inhalt
Chapter1. Introduction.- Chapter2. Literature Review.- Chapter 3. Profit Maximization Mechanism and Data Management for Data Analytics Services.- Chapter 4. Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks.- Chapter 5. Mechanism Design for Wireless Powered Spatial Crowdsourcing Networks.- Chapter 6. Summary and Future Work.
Informationen zu E-Books
Herzlichen Glückwunsch zum Kauf eines Ebooks bei der BUCHBOX! Hier nun ein paar praktische Infos.
Adobe-ID
Hast du E-Books mit einem Kopierschutz (DRM) erworben, benötigst du dazu immer eine Adobe-ID. Bitte klicke einfach hier und trage dort Namen, Mailadresse und ein selbstgewähltes Passwort ein. Die Kombination von Mailadresse und Passwort ist deine Adobe-ID. Notiere sie dir bitte sorgfältig.
Achtung: Wenn du kopiergeschützte E-Books OHNE Vergabe einer Adobe-ID herunterlädst, kannst du diese niemals auf einem anderen Gerät außer auf deinem PC lesen!!
Lesen auf dem Tablet oder Handy
Wenn du auf deinem Tablet lesen möchtest, verwende eine dafür geeignete App.
Für iPad oder Iphone etc. hole dir im iTunes-Store die Lese-App Bluefire
Lesen auf einem E-Book-Reader oder am PC / MAC
Um die Dateien auf deinen PC herunter zu laden und auf dein E-Book-Lesegerät zu übertragen gibt es die Software ADE (Adobe Digital Editions).
Andere Geräte / Software
Kindle von Amazon. Wir empfehlen diese Geräte NICHT.
EPUB mit Adobe-DRM können nicht mit einem Kindle von Amazon gelesen werden. Weder das Dateiformat EPUB, noch der Kopierschutz Adobe-DRM sind mit dem Kindle kompatibel. Umgekehrt können alle bei Amazon gekauften E-Books nur auf dem Gerät von Amazon gelesen werden. Lesegeräte wie der Tolino sind im Gegensatz hierzu völlig frei: Du kannst bei vielen tausend Buchhandlungen online Ebooks für den Tolino kaufen. Zum Beispiel hier bei uns.
Software für Sony-E-Book-Reader
Computer/Laptop mit Unix oder Linux
Die Software Adobe Digital Editions ist mit Unix und Linux nicht kompatibel. Mit einer WINE-Virtualisierung kommst du aber dennoch an deine E-Books.