Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Altruism (1)
- Beneficiary effect (1)
- Client-to-client (1)
- Competitive arousal (1)
- Cross-domain (1)
-
- Crowdsourcing (1)
- Event detection (1)
- Experimental economics (1)
- Finite Binomial Point Process (1)
- Gram-Charlier series expansion (1)
- Group buying (1)
- Group coordination (1)
- Human-centric computing (1)
- Influence pattern (1)
- Influential users (1)
- Interference Detection (1)
- Interference Mitigation (1)
- Key exchange (1)
- Markov decision process (1)
- Mobile node (1)
- Music diffusion (1)
- Nepotism (1)
- Password-based protocol (1)
- Sensor networks (1)
- Social network (1)
- Social networks (1)
- Social shopping. (1)
- Transmission Efficiency (1)
- Web of participants (1)
- Wireless Body Sensor Network (1)
Articles 1 - 7 of 7
Full-Text Articles in Computer Engineering
Distributed Event Detection In Sensor Networks Under Random Spatial Deployment, P. Zhang, G. Peters, I. Nevat, G. Xiao, Hwee-Pink Tan
Distributed Event Detection In Sensor Networks Under Random Spatial Deployment, P. Zhang, G. Peters, I. Nevat, G. Xiao, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
We present a novel event detection algorithm in sensor networks for the case where the sensors are randomly deployed in space. In particular we consider a random sensors deployment according to a Homogeneous Finite Binomial Point Process. We first derive the optimal event detection decision rule. We then develop a novel algorithm to evaluate the intractable marginal likelihood based on the Gram-Charlier series expansion. We evaluate our algorithms through extensive Monte Carlo simulations. Simulation results present the detection and false alarm rates for different system parameters such as number of sensors deployed, deployment region size etc.
Influences Of Influential Users: An Empirical Study Of Music Social Network, Jing Ren, Zhiyong Cheng, Jialie Shen, Feida Zhu
Influences Of Influential Users: An Empirical Study Of Music Social Network, Jing Ren, Zhiyong Cheng, Jialie Shen, Feida Zhu
Research Collection School Of Computing and Information Systems
Influential user can play a crucial role in online social networks. This paper documents an empirical study aiming at exploring the effects of influential users in the context of music social network. To achieve this goal, music diffusion graph is developed to model how information propagates over network. We also propose a heuristic method to measure users' influences. Using the real data from Last. fm, our empirical test demonstrates key effects of influential users and reveals limitations of existing influence identification/characterization schemes.
Sew-Ing A Simple Endorsement Web To Incentivize Trustworthy Participatory Sensing, T. Luo, S. Kanhere, Hwee-Pink Tan
Sew-Ing A Simple Endorsement Web To Incentivize Trustworthy Participatory Sensing, T. Luo, S. Kanhere, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
Two crucial issues to the success of participatory sensing are (a) how to incentivize the large crowd of mobile users to participate and (b) how to ensure the sensing data to be trustworthy. While they are traditionally being studied separately in the literature, this paper proposes a Simple Endorsement Web (SEW) to address both issues in a synergistic manner. The key idea is (a) introducing a social concept called nepotism into participatory sensing, by linking mobile users into a social “web of participants” with endorsement relations, and (b) overlaying this network with investment-like economic implications. The social and economic layers …
Qos-Aware Data Transmission And Wireless Energy Transfer: Performance Modeling And Optimization, D. Niyato, P. Wang, W. L. Yeow, Hwee-Pink Tan
Qos-Aware Data Transmission And Wireless Energy Transfer: Performance Modeling And Optimization, D. Niyato, P. Wang, W. L. Yeow, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
With wireless energy transfer, a mobile node can operate perpetually without having a wired connection to charge its battery. In this paper, we present a quality of service (QoS) aware data transmission and wireless energy transfer for the mobile node. The node can request for wireless energy transfer or transmit a packet when the node is in a coverage area of an access point. The node supports service differentiation for different type of traffic (i.e., low and high priority data). To meet the QoS requirement of each traffic type, we present the performance modeling and optimization framework. The objective is …
A Lightweight And Robust Interference Mitigation Scheme For Wireless Body Sensor Networks In Realistic Environments, S. Liang, Y. Ge, S. Jiang, Hwee-Pink Tan
A Lightweight And Robust Interference Mitigation Scheme For Wireless Body Sensor Networks In Realistic Environments, S. Liang, Y. Ge, S. Jiang, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
In dense deployments of Wireless Body Sensor Networks (WBSNs), inter-user interference significantly degrades network performance when multiple WBSN users stay in a small area such as hospitals. Due to the high dynamics of the environments, it is usually hard to schedule the transmissions of multiple WBSNs without a central controller. In this paper, we propose a robust and lightweight interference mitigation scheme for realistic WBSN systems through adaptive channel hopping. A WBSN testbed is set up to investigate the impact of inter-user interference on various performance metrics when different severity levels of interference are present. Based on the measurement results, …
Cross-Domain Password-Based Authenticated Key Exchange Revisited, Liqun Chen, Hoon Wei Lim, Guomin Yang
Cross-Domain Password-Based Authenticated Key Exchange Revisited, Liqun Chen, Hoon Wei Lim, Guomin Yang
Research Collection School Of Computing and Information Systems
We revisit the problem of secure cross-domain communication between two users belonging to different security domains within an open and distributed environment. Existing approaches presuppose that either the users are in possession of public key certificates issued by a trusted certificate authority (CA), or the associated domain authentication servers share a long-term secret key. In this article, we propose a generic framework for designing four-party password-based authenticated key exchange (4PAKE) protocols. Our framework takes a different approach from previous work. The users are not required to have public key certificates, but they simply reuse their login passwords, which they share …
Evaluating Electronic Market Designs: The Effects Of Competitive Arousal And Social Facilitation On Electronic Group Buying, Yuecheng Yu, Karl R. Lang, Alex Pelaez
Evaluating Electronic Market Designs: The Effects Of Competitive Arousal And Social Facilitation On Electronic Group Buying, Yuecheng Yu, Karl R. Lang, Alex Pelaez
Research Collection School Of Computing and Information Systems
This article presents an evaluation approach foralternative electronic market designs and examines theimpact of competitive arousal under time pressure onmarket performance in a group-buying setting. Drawingon theory from economics, decision theory, andinformation systems, we present a competitive arousalmodel for a social buying setting that posits thatintroducing competitive arousal among buyers reducesbuyer profits and that social facilitation can mitigate thesecosts through better task completion and time tocompletion rates. Using an economic experiment, wefound that rivalry has a negative effect on buyer profitsbut also that competitive arousal increases the efficiencyof social facilitation in terms of group formation. Wediscuss the implications of these …