A resource allocation model based on double-sided combinational auctions for transparent computing

Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement for the communication bandwidth, there is no research on the communication bandwidth boundary or resource allocation, which impedes the develop...

Full description

Saved in:
Bibliographic Details
Published inPeer-to-peer networking and applications Vol. 11; no. 4; pp. 679 - 696
Main Authors Wang, Jiaze, Liu, Anfeng, Yan, Tong, Zeng, Zhiwen
Format Journal Article
LanguageEnglish
Published New York Springer US 01.07.2018
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement for the communication bandwidth, there is no research on the communication bandwidth boundary or resource allocation, which impedes the development of TC. This paper focuses on studying an efficient transparent computing resource allocation model in an economic view. First, under the quality of experiments (QoE) ensured, the utility function of clients and transparent computing providers (TCPs) is constructed. After that, the demand boundary of communication bandwidth is analyzed under the ideal transparent computing model. Based on the above analyses, a resource allocation scheme based on double-sided combinational auctions (DCA) is proposed so that the resource can be shared by both the service side and the client side with the welfare of the whole society being maximized. Afterward, the results scheduled in different experimental scenarios are given, which verifies the effectiveness of the proposed strategy. Overall, this work provides an effective resource allocation model for optimizing the performance of TC.
AbstractList Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement for the communication bandwidth, there is no research on the communication bandwidth boundary or resource allocation, which impedes the development of TC. This paper focuses on studying an efficient transparent computing resource allocation model in an economic view. First, under the quality of experiments (QoE) ensured, the utility function of clients and transparent computing providers (TCPs) is constructed. After that, the demand boundary of communication bandwidth is analyzed under the ideal transparent computing model. Based on the above analyses, a resource allocation scheme based on double-sided combinational auctions (DCA) is proposed so that the resource can be shared by both the service side and the client side with the welfare of the whole society being maximized. Afterward, the results scheduled in different experimental scenarios are given, which verifies the effectiveness of the proposed strategy. Overall, this work provides an effective resource allocation model for optimizing the performance of TC.
Author Wang, Jiaze
Yan, Tong
Zeng, Zhiwen
Liu, Anfeng
Author_xml – sequence: 1
  givenname: Jiaze
  surname: Wang
  fullname: Wang, Jiaze
  organization: School of Information Science and Engineering, Central South University
– sequence: 2
  givenname: Anfeng
  surname: Liu
  fullname: Liu, Anfeng
  organization: School of Information Science and Engineering, Central South University
– sequence: 3
  givenname: Tong
  surname: Yan
  fullname: Yan, Tong
  organization: Business and Management Division, Beijing Normal University - Hong Kong Baptist University United International College
– sequence: 4
  givenname: Zhiwen
  surname: Zeng
  fullname: Zeng, Zhiwen
  email: zengzhiwen@csu.edu.cn
  organization: School of Information Science and Engineering, Central South University
BookMark eNp9kEtLxDAUhYOM4MzoD3AXcF3Nq2m7HAZfMOBG1yFJb4cOnaQm7cJ_bzoVBUFX91w43-Xcs0IL5x0gdE3JLSWkuIuUkZJnhBYZyXOZyTO0pBVPQuRk8a0Fu0CrGA-ESMpztkRmgwNEPwYLWHedt3povcNHX0OHjY5Q47TWfjQdZLGt02790bTu5NMd1qOdVMSND3gI2sVeB3DDZOvHoXX7S3Te6C7C1ddco7eH-9ftU7Z7eXzebnaZ5SUbMs2YaKSxomwEJdSUEqipoClrzquclEAASk6BQkEIk9QKIype1ZXIm0oaxtfoZr7bB_8-QhzUIf2VMkbFEsApkzlPrmJ22eBjDNAo2w6nZ1L4tlOUqKlQNReqUqFqKlTJRNJfZB_aow4f_zJsZmLyuj2En0x_Q5-nuIq2
CitedBy_id crossref_primary_10_1007_s10257_021_00502_x
crossref_primary_10_3390_sym9110269
crossref_primary_10_1016_j_comcom_2021_10_020
crossref_primary_10_1109_ACCESS_2018_2799681
crossref_primary_10_1109_ACCESS_2020_3015550
crossref_primary_10_1109_TSMC_2018_2833204
crossref_primary_10_1007_s12083_017_0566_4
crossref_primary_10_1007_s12083_020_00917_2
crossref_primary_10_1007_s42045_019_00015_9
crossref_primary_10_1155_2018_9715428
crossref_primary_10_1155_2021_6687189
crossref_primary_10_1049_joe_2018_9166
crossref_primary_10_1109_TSMC_2019_2944987
crossref_primary_10_33166_AETiC_2020_03_005
crossref_primary_10_1155_2021_9921731
crossref_primary_10_1109_ACCESS_2018_2853134
crossref_primary_10_1109_TVT_2021_3085310
crossref_primary_10_1177_1550147717749745
crossref_primary_10_3390_s18030751
crossref_primary_10_1109_ACCESS_2018_2809501
crossref_primary_10_3390_s18041216
crossref_primary_10_1007_s12083_018_0647_z
crossref_primary_10_1155_2021_5519647
crossref_primary_10_3390_s18072349
crossref_primary_10_1186_s13677_020_00213_7
crossref_primary_10_3390_s18051422
crossref_primary_10_1155_2021_5546684
crossref_primary_10_1109_ACCESS_2018_2858274
crossref_primary_10_1177_1550147720932750
crossref_primary_10_1155_2018_6328504
crossref_primary_10_1109_ACCESS_2020_2991261
crossref_primary_10_3390_s18061750
crossref_primary_10_1155_2021_5551762
crossref_primary_10_1186_s13638_017_1015_z
crossref_primary_10_3390_sym9100209
crossref_primary_10_3390_sym9100221
crossref_primary_10_1109_TVT_2017_2700049
crossref_primary_10_1109_ACCESS_2017_2756826
Cites_doi 10.1109/TMC.2012.161
10.1109/MCOM.2015.7060488
10.1049/iet-com.2016.0860
10.1109/TVT.2015.2472289
10.1007/s12083-016-0501-0
10.1109/JSYST.2015.2501750
10.1007/s11036-016-0745-1
10.1049/cje.2016.11.016
10.1504/IJAHUC.2016.075191
10.1109/JSYST.2015.2448355
10.1007/s12083-015-0331-5
10.1109/TDSC.2015.2406704
10.1007/s10922-016-9367-y
10.1504/IJAHUC.2018.10016988
10.1007/s12083-016-0457-0
10.1016/j.ins.2012.12.037
10.1109/JSYST.2015.2442994
10.1504/IJAHUC.2016.075188
10.1002/cpe.3485
10.1109/MWC.2015.7224730
10.1109/TPDS.2013.124
10.1109/TMM.2016.2566584
10.1109/TCOMM.2013.050613.121698
10.1109/TMC.2013.129
10.1109/TIFS.2016.2570740
10.1016/j.jss.2015.06.025
10.1145/2886780
10.1109/JIOT.2015.2471260
10.1109/MWC.2015.7224727
10.1109/TPDS.2013.23
10.1109/TST.2013.6449403
10.1109/AINA.2015.254
10.1109/TII.2015.2411231
10.1007/s11227-014-1311-x
10.1109/TC.2016.2519901
10.1109/MNET.2016.7389831
10.1016/j.ins.2014.02.008
10.1109/TSC.2015.2449314
ContentType Journal Article
Copyright Springer Science+Business Media New York 2017
Peer-to-Peer Networking and Applications is a copyright of Springer, (2017). All Rights Reserved.
Copyright_xml – notice: Springer Science+Business Media New York 2017
– notice: Peer-to-Peer Networking and Applications is a copyright of Springer, (2017). All Rights Reserved.
DBID AAYXX
CITATION
3V.
7SC
7XB
88I
8AL
8AO
8FD
8FE
8FG
8FK
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
GUQSH
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
M2O
M2P
MBDVC
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1007/s12083-017-0556-6
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest Central (purchase pre-March 2016)
Science Database (Alumni Edition)
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Research Library
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Research Library
Science Database
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Science Journals (Alumni Edition)
ProQuest Central Basic
ProQuest Science Journals
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList Research Library Prep

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1936-6450
EndPage 696
ExternalDocumentID 10_1007_s12083_017_0556_6
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61379110
  funderid: http://dx.doi.org/10.13039/501100001809
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
06D
0R~
0VY
123
1N0
203
29O
29~
2JN
2JY
2KG
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
5VS
67Z
6NX
875
88I
8AO
8FE
8FG
8G5
8TC
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABMNI
ABMQK
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACGOD
ACHSB
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALFXC
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
ANMIH
AOCGG
ARAPS
ARCSS
AUKKA
AXYYD
AYJHY
AZQEC
B-.
BA0
BDATZ
BENPR
BGLVJ
BGNMA
BPHCQ
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DNIVK
DPUIP
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GUQSH
GXS
H13
HCIFZ
HF~
HG5
HG6
HLICF
HMJXF
HQYDN
HRMNR
HZ~
I0C
IJ-
IKXTQ
IWAJR
IXC
IXD
IZIGR
IZQ
I~X
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K6V
K7-
KOV
LLZTM
M0N
M2O
M2P
M4Y
MA-
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
P62
P9P
PQQKQ
PROAC
PT4
Q2X
QOS
R89
RIG
RLLFE
RNS
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SDH
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
T13
TH9
TSG
TSK
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W48
WK8
YLTOR
Z45
Z7X
Z83
Z88
ZMTXR
~A9
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ACSTC
AEZWR
AFDZB
AFHIU
AFOHR
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
7SC
7XB
8AL
8FD
8FK
ABRTQ
JQ2
L7M
L~C
L~D
MBDVC
PKEHL
PQEST
PQGLB
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c382t-a224f6bc48f4101b86e1b9ef8d339508e0ee831e1e700261c4b4939d945f96b23
IEDL.DBID BENPR
ISSN 1936-6442
IngestDate Fri Jul 25 06:56:45 EDT 2025
Tue Jul 01 01:29:10 EDT 2025
Thu Apr 24 23:08:29 EDT 2025
Fri Feb 21 02:34:38 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Resources optimization
Double-sided auctions
Transparent computing
Communication bandwidth boundary
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c382t-a224f6bc48f4101b86e1b9ef8d339508e0ee831e1e700261c4b4939d945f96b23
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2026312653
PQPubID 54523
PageCount 18
ParticipantIDs proquest_journals_2026312653
crossref_citationtrail_10_1007_s12083_017_0556_6
crossref_primary_10_1007_s12083_017_0556_6
springer_journals_10_1007_s12083_017_0556_6
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-07-01
PublicationDateYYYYMMDD 2018-07-01
PublicationDate_xml – month: 07
  year: 2018
  text: 2018-07-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Norwell
PublicationTitle Peer-to-peer networking and applications
PublicationTitleAbbrev Peer-to-Peer Netw. Appl
PublicationYear 2018
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Al FaruqueMAVatanparvarKEnergy management-as-a-service over fog computing platformIEEE Internet Things J20163216116910.1109/JIOT.2015.2471260
HeSChenJJiangFYauDKXingGSunYEnergy provisioning in wireless rechargeable sensor networksIEEE Trans Mob Comput201312101931194210.1109/TMC.2012.161
LiuXDongMOtaKHungPLiuAService pricing decision in cyber-physical systems: insights from game theoryIEEE Trans Serv Comput20169218619810.1109/TSC.2015.2449314
Ren J, Zhang Y, Zhang K, et al (2015) Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions[J]. IEEE Communications Magazine 53(3):98–105.
HoangDTNiyatoDWangPOptimal admission control policy for mobile cloud computing hotspot with cloudlet ∥WCNC 20122012AtlantaIEEE Press31453149
LiHYangYLuanTHLiangXZhouLShenXSEnabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud dataIEEE Trans Dependable Secure Comput201613331232510.1109/TDSC.2015.2406704
RenJZhangYZhangKLiuAChenJShenXSLifetime and energy hole evolution analysis in data-gathering wireless sensor networksIEEE Trans Ind Inform201612278880010.1109/TII.2015.2411231
DengXPengQHeLHeTInterference-aware QoS routing for neighborhood area network in smart gridIET Commun2016
LiuYDongMOtaKLiuAActiveTrust: secure and trustable routing in wireless sensor networksIEEE Trans Inf Forensic Secur2016112013202710.1109/TIFS.2016.2570740
SamimiPTeimouriYMukhtarMA combinatorial double auction resource allocation model in cloud computingInf Sci201635720121610.1016/j.ins.2014.02.008
GuoKXiaoYDuanGA cost-efficient architecture for the campus information system based on transparent computing platformInt J Ad Hoc Ubiquit Comput20162129510310.1504/IJAHUC.2016.075188
StojmenovicIWenSHuangXLuanHAn overview of fog computing and its security issuesConcurr Comput: Pract Experience201528102991300510.1002/cpe.3485
LiuJZhouYZhangDTranSim: a simulation framework for cache-enabled transparent computing systemsIEEE Trans Comput2016651031713183354882610.1109/TC.2016.25199011360.68883
XueCLinCPerformance modelling for transparent computing using stochastic petri netsInt J Ad Hoc Ubiquit Comput2016212819410.1504/IJAHUC.2016.075191
HeSChenJLiXShenXSSunYMobility and intruder prior information improving the barrier coverage of sparse sensor networksIEEE Trans Mob Comput20141361268128210.1109/TMC.2013.129
DengXLiGDongMOtaKFinding overlapping communities based on Markov chain and link clusteringPeer-to-Peer Netw Appl201710241142010.1007/s12083-016-0457-0
Kim SH, Kang DK, Kim WJ, Chen M., & Youn CH (2016) A science gateway cloud with cost adaptive VM management scheme for computational scientific applications. IEEE Syst J doi:10.1109/JSYST.2015.2501750
MianxiongDKimataTSugiuraKQuality-of-experience (QoE) in emerging mobile social networksIEICE Trans Inf Syst2014971026062612
SuZXuQQiQBig data in mobile social networks: a QoE-oriented frameworkIEEE Netw2016301525710.1109/MNET.2016.7389831
SamaanNA novel economic sharing model in a federation of selfish cloud providersIEEE Trans Parallel Distrib Syst2014251122110.1109/TPDS.2013.23
ChenZLiuALiZChoiYJLiJDistributed duty cycle control for delay improvement in wireless sensor networksPeer-to-Peer Netw Appl201710355957810.1007/s12083-016-0501-0
PlataniaMObenshainDTantilloTAmirYSuriNOn choosing server-or client-side solutions for BFTACM Comput Surv (CSUR)20164846110.1145/2886780
ChoiCRJeongHYParkJHJangHJJeongYSRelative weight comparison between virtual key factors of cloud computing with analytic network processJ Supercomput20167251694171410.1007/s11227-014-1311-x
LiHLiuDDaiYLuanTHEngineering searchable encryption of mobile cloud networks: when qoe meets qopIEEE Wirel Commun2015224748010.1109/MWC.2015.7224730
Yaoxue Zhang, Ju Ren, Jiagang Liu, et al (2017) A Survey on Emerging Computing Paradigms for Big Data. Chinese Journal of Electronics 26(1):1–12
ZhangYHeSChenJDistributed sampling rate control for rechargeable sensor nodes with limited battery capacityIEEE Trans Wirel Commun20131263096310610.1109/TCOMM.2013.050613.121698
Zhao S, Liu A (2017) High performance target tracking scheme with low prediction precision requirement in WSNs, International Journal of Ad Hoc and Ubiquitous Computing, http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijahuc
LiYChenMDaiWQiuMEnergy optimization with dynamic task scheduling mobile cloud computingIEEE Syst J2015
LiHLinXYangHLiangXLuRShenXEPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart gridIEEE Trans Parallel Distrib Syst20142582053206410.1109/TPDS.2013.124
ZhangYZhouYTransparent computing: spatio-temporal extension on von neumann architecture for cloud servicesTsinghua Sci Technol2013181102110.1109/TST.2013.6449403
DongMLiuXQianZQoE-ensured price competition model for emerging mobile networksIEEE Wirel Commun2015224505710.1109/MWC.2015.7224727
Aazam M, Huh EN (2015) Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT[C] //. IEEE 29th Int Conf Adv Inf Netw Appl:687–694
ChenMMaYSongJLaiCHuBSmart clothing: connecting human with clouds and big data for sustainable health monitoringACM/Springer Mob Netw Appl201621582584510.1007/s11036-016-0745-1
BaranwalGVidyarthiDPA fair multi-attribute combinatorial double auction model for resource allocation in cloud computingJ Syst Softw2015108607610.1016/j.jss.2015.06.025
DengXHeLLiXLiuQCaiLChenZA reliable QoS aware routing scheme for neighbor area nework in smart gridPeer-to-Peer Netw Appl20169461662710.1007/s12083-015-0331-5
SuZXuQFeiMDongMGame theoretic resource allocation in media cloud with mobile social usersIEEE Trans Multimed20161881650166010.1109/TMM.2016.2566584
ZengJYangLTMaJA system-level modeling and design for cyber-physical-social systemsACM Trans Embed Comput Syst (TECS)201615235
XuQSuZGuoSA game theoretical incentive scheme for relay selection services in mobile social networksIEEE Trans Veh Technol20166586692670210.1109/TVT.2015.2472289
LiuAJinXCuiGChenZDeployment guidelines for achieving maximal Lifetime and avoiding energy holes in sensor networkInf Sci201323019722610.1016/j.ins.2012.12.037
Gui J, & Zhou K (2016) Flexible adjustments between energy and capacity for topology control in heterogeneous wireless multi-hop networks. Journal of Network and Systems Management 1-24
Long J, Dong M, Ota K, Liu A (2015) Green TDMA scheduling algorithm for prolonging Lifetime in wireless sensor networks. IEEE Syst J doi:10.1109/JSYST.2015.2448355.
M Dong (556_CR40) 2015; 22
X Deng (556_CR15) 2016; 9
H Li (556_CR32) 2014; 25
J Ren (556_CR13) 2016; 12
J Zeng (556_CR11) 2016; 15
DT Hoang (556_CR25) 2012
J Liu (556_CR2) 2016; 65
556_CR33
Y Zhang (556_CR5) 2013; 18
CR Choi (556_CR22) 2016; 72
X Deng (556_CR23) 2016
S He (556_CR27) 2014; 13
Y Zhang (556_CR12) 2013; 12
MA Al Faruque (556_CR37) 2016; 3
I Stojmenovic (556_CR36) 2015; 28
M Chen (556_CR34) 2016; 21
S He (556_CR28) 2013; 12
Z Chen (556_CR14) 2017; 10
556_CR19
A Liu (556_CR9) 2013; 230
M Platania (556_CR17) 2016; 48
K Guo (556_CR3) 2016; 21
P Samimi (556_CR38) 2016; 357
C Xue (556_CR6) 2016; 21
556_CR24
Z Su (556_CR8) 2016; 18
X Liu (556_CR26) 2016; 9
556_CR29
Z Su (556_CR10) 2016; 30
D Mianxiong (556_CR16) 2014; 97
556_CR1
H Li (556_CR18) 2015; 22
Y Li (556_CR4) 2015
Q Xu (556_CR31) 2016; 65
G Baranwal (556_CR39) 2015; 108
N Samaan (556_CR41) 2014; 25
556_CR20
Y Liu (556_CR30) 2016; 11
H Li (556_CR7) 2016; 13
556_CR21
X Deng (556_CR35) 2017; 10
References_xml – reference: SamaanNA novel economic sharing model in a federation of selfish cloud providersIEEE Trans Parallel Distrib Syst2014251122110.1109/TPDS.2013.23
– reference: ZhangYHeSChenJDistributed sampling rate control for rechargeable sensor nodes with limited battery capacityIEEE Trans Wirel Commun20131263096310610.1109/TCOMM.2013.050613.121698
– reference: LiYChenMDaiWQiuMEnergy optimization with dynamic task scheduling mobile cloud computingIEEE Syst J2015
– reference: DengXLiGDongMOtaKFinding overlapping communities based on Markov chain and link clusteringPeer-to-Peer Netw Appl201710241142010.1007/s12083-016-0457-0
– reference: Yaoxue Zhang, Ju Ren, Jiagang Liu, et al (2017) A Survey on Emerging Computing Paradigms for Big Data. Chinese Journal of Electronics 26(1):1–12
– reference: ChenZLiuALiZChoiYJLiJDistributed duty cycle control for delay improvement in wireless sensor networksPeer-to-Peer Netw Appl201710355957810.1007/s12083-016-0501-0
– reference: BaranwalGVidyarthiDPA fair multi-attribute combinatorial double auction model for resource allocation in cloud computingJ Syst Softw2015108607610.1016/j.jss.2015.06.025
– reference: Gui J, & Zhou K (2016) Flexible adjustments between energy and capacity for topology control in heterogeneous wireless multi-hop networks. Journal of Network and Systems Management 1-24
– reference: LiHLinXYangHLiangXLuRShenXEPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart gridIEEE Trans Parallel Distrib Syst20142582053206410.1109/TPDS.2013.124
– reference: DengXHeLLiXLiuQCaiLChenZA reliable QoS aware routing scheme for neighbor area nework in smart gridPeer-to-Peer Netw Appl20169461662710.1007/s12083-015-0331-5
– reference: XueCLinCPerformance modelling for transparent computing using stochastic petri netsInt J Ad Hoc Ubiquit Comput2016212819410.1504/IJAHUC.2016.075191
– reference: ZengJYangLTMaJA system-level modeling and design for cyber-physical-social systemsACM Trans Embed Comput Syst (TECS)201615235
– reference: LiHLiuDDaiYLuanTHEngineering searchable encryption of mobile cloud networks: when qoe meets qopIEEE Wirel Commun2015224748010.1109/MWC.2015.7224730
– reference: Ren J, Zhang Y, Zhang K, et al (2015) Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions[J]. IEEE Communications Magazine 53(3):98–105.
– reference: DengXPengQHeLHeTInterference-aware QoS routing for neighborhood area network in smart gridIET Commun2016
– reference: XuQSuZGuoSA game theoretical incentive scheme for relay selection services in mobile social networksIEEE Trans Veh Technol20166586692670210.1109/TVT.2015.2472289
– reference: Long J, Dong M, Ota K, Liu A (2015) Green TDMA scheduling algorithm for prolonging Lifetime in wireless sensor networks. IEEE Syst J doi:10.1109/JSYST.2015.2448355.
– reference: SuZXuQFeiMDongMGame theoretic resource allocation in media cloud with mobile social usersIEEE Trans Multimed20161881650166010.1109/TMM.2016.2566584
– reference: MianxiongDKimataTSugiuraKQuality-of-experience (QoE) in emerging mobile social networksIEICE Trans Inf Syst2014971026062612
– reference: LiuXDongMOtaKHungPLiuAService pricing decision in cyber-physical systems: insights from game theoryIEEE Trans Serv Comput20169218619810.1109/TSC.2015.2449314
– reference: LiHYangYLuanTHLiangXZhouLShenXSEnabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud dataIEEE Trans Dependable Secure Comput201613331232510.1109/TDSC.2015.2406704
– reference: HeSChenJJiangFYauDKXingGSunYEnergy provisioning in wireless rechargeable sensor networksIEEE Trans Mob Comput201312101931194210.1109/TMC.2012.161
– reference: SamimiPTeimouriYMukhtarMA combinatorial double auction resource allocation model in cloud computingInf Sci201635720121610.1016/j.ins.2014.02.008
– reference: SuZXuQQiQBig data in mobile social networks: a QoE-oriented frameworkIEEE Netw2016301525710.1109/MNET.2016.7389831
– reference: ChoiCRJeongHYParkJHJangHJJeongYSRelative weight comparison between virtual key factors of cloud computing with analytic network processJ Supercomput20167251694171410.1007/s11227-014-1311-x
– reference: Zhao S, Liu A (2017) High performance target tracking scheme with low prediction precision requirement in WSNs, International Journal of Ad Hoc and Ubiquitous Computing, http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijahuc
– reference: LiuJZhouYZhangDTranSim: a simulation framework for cache-enabled transparent computing systemsIEEE Trans Comput2016651031713183354882610.1109/TC.2016.25199011360.68883
– reference: LiuAJinXCuiGChenZDeployment guidelines for achieving maximal Lifetime and avoiding energy holes in sensor networkInf Sci201323019722610.1016/j.ins.2012.12.037
– reference: LiuYDongMOtaKLiuAActiveTrust: secure and trustable routing in wireless sensor networksIEEE Trans Inf Forensic Secur2016112013202710.1109/TIFS.2016.2570740
– reference: Kim SH, Kang DK, Kim WJ, Chen M., & Youn CH (2016) A science gateway cloud with cost adaptive VM management scheme for computational scientific applications. IEEE Syst J doi:10.1109/JSYST.2015.2501750
– reference: Aazam M, Huh EN (2015) Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT[C] //. IEEE 29th Int Conf Adv Inf Netw Appl:687–694
– reference: HoangDTNiyatoDWangPOptimal admission control policy for mobile cloud computing hotspot with cloudlet ∥WCNC 20122012AtlantaIEEE Press31453149
– reference: RenJZhangYZhangKLiuAChenJShenXSLifetime and energy hole evolution analysis in data-gathering wireless sensor networksIEEE Trans Ind Inform201612278880010.1109/TII.2015.2411231
– reference: ChenMMaYSongJLaiCHuBSmart clothing: connecting human with clouds and big data for sustainable health monitoringACM/Springer Mob Netw Appl201621582584510.1007/s11036-016-0745-1
– reference: StojmenovicIWenSHuangXLuanHAn overview of fog computing and its security issuesConcurr Comput: Pract Experience201528102991300510.1002/cpe.3485
– reference: Al FaruqueMAVatanparvarKEnergy management-as-a-service over fog computing platformIEEE Internet Things J20163216116910.1109/JIOT.2015.2471260
– reference: ZhangYZhouYTransparent computing: spatio-temporal extension on von neumann architecture for cloud servicesTsinghua Sci Technol2013181102110.1109/TST.2013.6449403
– reference: GuoKXiaoYDuanGA cost-efficient architecture for the campus information system based on transparent computing platformInt J Ad Hoc Ubiquit Comput20162129510310.1504/IJAHUC.2016.075188
– reference: DongMLiuXQianZQoE-ensured price competition model for emerging mobile networksIEEE Wirel Commun2015224505710.1109/MWC.2015.7224727
– reference: PlataniaMObenshainDTantilloTAmirYSuriNOn choosing server-or client-side solutions for BFTACM Comput Surv (CSUR)20164846110.1145/2886780
– reference: HeSChenJLiXShenXSSunYMobility and intruder prior information improving the barrier coverage of sparse sensor networksIEEE Trans Mob Comput20141361268128210.1109/TMC.2013.129
– volume: 12
  start-page: 1931
  issue: 10
  year: 2013
  ident: 556_CR28
  publication-title: IEEE Trans Mob Comput
  doi: 10.1109/TMC.2012.161
– ident: 556_CR21
  doi: 10.1109/MCOM.2015.7060488
– year: 2016
  ident: 556_CR23
  publication-title: IET Commun
  doi: 10.1049/iet-com.2016.0860
– volume: 65
  start-page: 6692
  issue: 8
  year: 2016
  ident: 556_CR31
  publication-title: IEEE Trans Veh Technol
  doi: 10.1109/TVT.2015.2472289
– volume: 10
  start-page: 559
  issue: 3
  year: 2017
  ident: 556_CR14
  publication-title: Peer-to-Peer Netw Appl
  doi: 10.1007/s12083-016-0501-0
– volume: 97
  start-page: 2606
  issue: 10
  year: 2014
  ident: 556_CR16
  publication-title: IEICE Trans Inf Syst
– ident: 556_CR1
  doi: 10.1109/JSYST.2015.2501750
– volume: 15
  start-page: 35
  issue: 2
  year: 2016
  ident: 556_CR11
  publication-title: ACM Trans Embed Comput Syst (TECS)
– volume: 21
  start-page: 825
  issue: 5
  year: 2016
  ident: 556_CR34
  publication-title: ACM/Springer Mob Netw Appl
  doi: 10.1007/s11036-016-0745-1
– ident: 556_CR20
  doi: 10.1049/cje.2016.11.016
– volume: 21
  start-page: 81
  issue: 2
  year: 2016
  ident: 556_CR6
  publication-title: Int J Ad Hoc Ubiquit Comput
  doi: 10.1504/IJAHUC.2016.075191
– ident: 556_CR33
  doi: 10.1109/JSYST.2015.2448355
– volume: 9
  start-page: 616
  issue: 4
  year: 2016
  ident: 556_CR15
  publication-title: Peer-to-Peer Netw Appl
  doi: 10.1007/s12083-015-0331-5
– volume: 13
  start-page: 312
  issue: 3
  year: 2016
  ident: 556_CR7
  publication-title: IEEE Trans Dependable Secure Comput
  doi: 10.1109/TDSC.2015.2406704
– ident: 556_CR29
  doi: 10.1007/s10922-016-9367-y
– ident: 556_CR24
  doi: 10.1504/IJAHUC.2018.10016988
– volume: 10
  start-page: 411
  issue: 2
  year: 2017
  ident: 556_CR35
  publication-title: Peer-to-Peer Netw Appl
  doi: 10.1007/s12083-016-0457-0
– volume: 230
  start-page: 197
  year: 2013
  ident: 556_CR9
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2012.12.037
– year: 2015
  ident: 556_CR4
  publication-title: IEEE Syst J
  doi: 10.1109/JSYST.2015.2442994
– volume: 21
  start-page: 95
  issue: 2
  year: 2016
  ident: 556_CR3
  publication-title: Int J Ad Hoc Ubiquit Comput
  doi: 10.1504/IJAHUC.2016.075188
– volume: 28
  start-page: 2991
  issue: 10
  year: 2015
  ident: 556_CR36
  publication-title: Concurr Comput: Pract Experience
  doi: 10.1002/cpe.3485
– volume: 22
  start-page: 74
  issue: 4
  year: 2015
  ident: 556_CR18
  publication-title: IEEE Wirel Commun
  doi: 10.1109/MWC.2015.7224730
– start-page: 3145
  volume-title: Optimal admission control policy for mobile cloud computing hotspot with cloudlet ∥WCNC 2012
  year: 2012
  ident: 556_CR25
– volume: 25
  start-page: 2053
  issue: 8
  year: 2014
  ident: 556_CR32
  publication-title: IEEE Trans Parallel Distrib Syst
  doi: 10.1109/TPDS.2013.124
– volume: 18
  start-page: 1650
  issue: 8
  year: 2016
  ident: 556_CR8
  publication-title: IEEE Trans Multimed
  doi: 10.1109/TMM.2016.2566584
– volume: 12
  start-page: 3096
  issue: 6
  year: 2013
  ident: 556_CR12
  publication-title: IEEE Trans Wirel Commun
  doi: 10.1109/TCOMM.2013.050613.121698
– volume: 13
  start-page: 1268
  issue: 6
  year: 2014
  ident: 556_CR27
  publication-title: IEEE Trans Mob Comput
  doi: 10.1109/TMC.2013.129
– volume: 11
  start-page: 2013
  year: 2016
  ident: 556_CR30
  publication-title: IEEE Trans Inf Forensic Secur
  doi: 10.1109/TIFS.2016.2570740
– volume: 108
  start-page: 60
  year: 2015
  ident: 556_CR39
  publication-title: J Syst Softw
  doi: 10.1016/j.jss.2015.06.025
– volume: 48
  start-page: 61
  issue: 4
  year: 2016
  ident: 556_CR17
  publication-title: ACM Comput Surv (CSUR)
  doi: 10.1145/2886780
– volume: 3
  start-page: 161
  issue: 2
  year: 2016
  ident: 556_CR37
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2015.2471260
– volume: 22
  start-page: 50
  issue: 4
  year: 2015
  ident: 556_CR40
  publication-title: IEEE Wirel Commun
  doi: 10.1109/MWC.2015.7224727
– volume: 25
  start-page: 12
  issue: 1
  year: 2014
  ident: 556_CR41
  publication-title: IEEE Trans Parallel Distrib Syst
  doi: 10.1109/TPDS.2013.23
– volume: 18
  start-page: 10
  issue: 1
  year: 2013
  ident: 556_CR5
  publication-title: Tsinghua Sci Technol
  doi: 10.1109/TST.2013.6449403
– ident: 556_CR19
  doi: 10.1109/AINA.2015.254
– volume: 12
  start-page: 788
  issue: 2
  year: 2016
  ident: 556_CR13
  publication-title: IEEE Trans Ind Inform
  doi: 10.1109/TII.2015.2411231
– volume: 72
  start-page: 1694
  issue: 5
  year: 2016
  ident: 556_CR22
  publication-title: J Supercomput
  doi: 10.1007/s11227-014-1311-x
– volume: 65
  start-page: 3171
  issue: 10
  year: 2016
  ident: 556_CR2
  publication-title: IEEE Trans Comput
  doi: 10.1109/TC.2016.2519901
– volume: 30
  start-page: 52
  issue: 1
  year: 2016
  ident: 556_CR10
  publication-title: IEEE Netw
  doi: 10.1109/MNET.2016.7389831
– volume: 357
  start-page: 201
  year: 2016
  ident: 556_CR38
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2014.02.008
– volume: 9
  start-page: 186
  issue: 2
  year: 2016
  ident: 556_CR26
  publication-title: IEEE Trans Serv Comput
  doi: 10.1109/TSC.2015.2449314
SSID ssj0061352
Score 2.4729755
Snippet Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 679
SubjectTerms Bandwidths
Communication
Communications Engineering
Computer Communication Networks
Computing costs
Economic models
Engineering
Information Systems and Communication Service
Networks
Resource allocation
Signal,Image and Speech Processing
Special Issue on Transparent Computing
SummonAdditionalLinks – databaseName: SpringerLink Journals (ICM)
  dbid: U2A
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgXOCAeIrBQDlwAkVqkzRLjxNimpDgxKTdqiZNTtM2bd3_x-5jBQRIHKu6kWrH8ZfY-QxwH5y2Qx1inlqbcyUC-hxOHZ4ilAhRPhSJpwP91zc9maqXWTJr7nFv2mr3NiVZrdTdZTeBcIHTqkoEMFzvw0GCW3eq45qKUbv8Yniq2uwgMEEZpUSbyvxpiK_BqEOY35KiVawZn8BxAxLZqLbqKez5xRkcfaIOPAc7Yuvm5J1R7rw-eWNVYxtGoalg-Fgst3buObXkLBj-Jm6Dm8M_lte0sRuGqJWVFcU53QsrSWy1pWLoC5iOn9-fJrzpl8CdNKLkOYbjoK1TJij0NGu0j23qgymkpGavPvIeDeFjP6y2Xk5Zlcq0SFUSUm2FvITeYrnwV8CscgZdXypH_HjK58IFJ22eaGPi2Ed9iFrFZa4hE6eeFvOso0EmXWeo64x0nek-POw-WdVMGn8JD1prZI1TbTI0tpax0Insw2Nroe71r4Nd_0v6Bg4RFJm6JHcAvXK99bcIPEp7V020D6RBznE
  priority: 102
  providerName: Springer Nature
Title A resource allocation model based on double-sided combinational auctions for transparent computing
URI https://link.springer.com/article/10.1007/s12083-017-0556-6
https://www.proquest.com/docview/2026312653
Volume 11
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dT9swED9B-8Iepo0PrQMqP_AEstTYjus8TWX0QxsgxFYJnqLYsZ9Q29H0_-cuceiGNJ6iyI6l3Nl3P9_ZvwM4C07boQ4Jz6wtuBIB1xxOHZ4hlAiDYihSTwH9m1s9m6sfD-lDDLit47HK1ibWhrpcOoqR0yZdy0ToVH5b_eFUNYqyq7GExi500QQb04Hu5fj27r61xeir6po7iFI0R88v2rxmfXlOIPzgZKWJUIbrfz3TFm6-yZDWjmfyCT5GxMhGjYo_w45f7MOHv3gED8CO2HMMwzNKpDdhOFZXuWHkp0qGr-VyY588p_qcJcOfxj1xjASyouGQXTOEsKyq-c7pklhF3VYbOhl9CPPJ-Pf3GY_FE7iTRlS8QN8ctHXKBIXLzhrtE5v5YEopqfKrH3iPWvGJH9b7MKesymRWZioNmbZCHkFnsVz4L8CscgbtgFSOyPKUL4QLTtoi1cYkiR_0YNAKLneRWZwKXDzlW05kknWOss5J1rnuwfnrJ6uGVuO9zietNvK4wtb5dj704KLV0Lb5v4N9fX-wY9hDSGSaA7kn0KmeN_4UYUdl-7BrJtM-dEdXN9e_6Dl9_DnuxxmHrXMxegHjudgv
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8MwDLYQHIAD4inGMwe4gCKtaZqlB4QmYIznCSRupUmT07QN1gnxp_iN2H0wQILbjlXTqHIc-7OdfAY48FaZlvIBj41JuRQe9xyqDo8RSvhm2hKRo4T-3b3qPsrrp-hpBj7quzB0rLK2iYWhzgaWcuQUpKswECoKT4cvnLpGUXW1bqFRqsWNe3_DkG10cnWO63soROfi4azLq64C3IZa5DxFp-WVsVJ7ifpotHKBiZ3XWRhSS1TXdA5_1wWuVQQoVhoZh3EWy8jHyhDRAZr8OYmjKdjTncva8qNnLDr8ICZSHHGGqKuoxVU9gWCHk08g-hqufvrBCbj9VY8t3FxnGZYqfMrapUKtwIzrr8LiN9bCNTBt9lol_RmV7cukHyt66jDyihnDx2wwNj3HqRtoxlDEGIFXeUeWloy1I4aAmeUFuzpdSctp2HBM57DX4XEqQt2A2f6g7zaBGWk1Wp1QWqLmky4V1tvQpJHSOghcswHNWnCJrXjMqZ1GL5kwMJOsE5R1QrJOVAOOvj4ZliQe_w3eqVcjqfbzKJloXwOO6xWavP5zsq3_J9uH-e7D3W1ye3V_sw0LCMZ0eRR4B2bz17HbRcCTm71Cyxg8T1utPwEbnA1_
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8MwDLbQkBAcEE8xGJADXEARa5pm7QGh8Zh4TgiBxK00aXKatsE6If4avw67DwZIcONYNY0qx7E_28lngB1nlG4p5_FI64RL4XDPoerwCKGEayYtEVhK6N901fmDvHwMHqfgvboLQ8cqK5uYG-p0YChHTkG68j2hAv_Alccibk87R8NnTh2kqNJatdMoVOTKvr1i-DY6vDjFtd4VonN2f3LOyw4D3PihyHiCDswpbWToJOqmDpX1dGRdmPo-tUe1TWvx161nW3mwYqSWkR-lkQxcpDSRHqD5n25RVFSD6eOz7u1d5QfQT-b9fhAhKY6oQ1Q11fzinkDow8lDEJkNV9-94gTq_qjO5k6vswDzJVpl7UK9FmHK9pdg7guH4TLoNnspSwCMivhFCpDlHXYY-ciU4WM6GOue5dQbNGUocIzHyywkSwr-2hFD-MyynGudLqhlNGw4plPZK_DwL2JdhVp_0LdrwLQ0IdogXxoi6pM2EcYZXyeBCkPPs806NCvBxaZkNafmGr14wsdMso5R1jHJOlZ12Pv8ZFhQevw1uFGtRlzu7lE80cU67FcrNHn962Trf0-2DTOo0vH1RfdqA2YRmYXFueAG1LKXsd1E9JPprVLNGDz9t2Z_AFKqExE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+resource+allocation+model+based+on+double-sided+combinational+auctions+for+transparent+computing&rft.jtitle=Peer-to-peer+networking+and+applications&rft.au=Wang%2C+Jiaze&rft.au=Liu%2C+Anfeng&rft.au=Tong%2C+Yan&rft.au=Zeng%2C+Zhiwen&rft.date=2018-07-01&rft.pub=Springer+Nature+B.V&rft.issn=1936-6442&rft.eissn=1936-6450&rft.volume=11&rft.issue=4&rft.spage=679&rft.epage=696&rft_id=info:doi/10.1007%2Fs12083-017-0556-6&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1936-6442&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1936-6442&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1936-6442&client=summon