T-Chain: A General Incentive Scheme for Cooperative Computing

Cited 8 time in webofscience Cited 8 time in scopus
  • Hit : 685
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorShin, Kyuyongko
dc.contributor.authorJoe-Wong, Carleeko
dc.contributor.authorHa, Sangtaeko
dc.contributor.authorYi, Yungko
dc.contributor.authorRhee, Injongko
dc.contributor.authorReeves, Douglas S.ko
dc.date.accessioned2017-09-25T06:02:53Z-
dc.date.available2017-09-25T06:02:53Z-
dc.date.created2017-09-18-
dc.date.created2017-09-18-
dc.date.issued2017-08-
dc.identifier.citationIEEE-ACM TRANSACTIONS ON NETWORKING, v.25, no.4, pp.2122 - 2137-
dc.identifier.issn1063-6692-
dc.identifier.urihttp://hdl.handle.net/10203/226140-
dc.description.abstractIn this paper, we propose a simple, distributed, but highly efficient fairness-enforcing incentive mechanism for cooperative computing. The proposed mechanism, called triangle chaining (T-Chain), enforces reciprocity to avoid the exploitable aspects of the schemes that allow free-riding. In T-Chain, symmetric key cryptography provides the basis for a lightweight, almost-fair exchange protocol, which is coupled with a pay-it-forward mechanism. This combination increases the opportunity for multi-lateral exchanges and further maximizes the resource utilization of participants, each of whom is assumed to operate solely for his or her own benefit. T-Chain also provides barrier-free entry to newcomers with flexible resource allocation, allowing them to immediately benefit, and, therefore, is suitable for dynamic environments with high churn (i.e., turnover). T-Chain is distributed and simple to implement, as no trusted third party is required to monitor or enforce the scheme, nor is there any reliance on reputation information or tokens.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectP2P-VOD SYSTEMS-
dc.subjectNETWORKS-
dc.subjectDESIGN-
dc.titleT-Chain: A General Incentive Scheme for Cooperative Computing-
dc.typeArticle-
dc.identifier.wosid000408419600014-
dc.identifier.scopusid2-s2.0-85017439497-
dc.type.rimsART-
dc.citation.volume25-
dc.citation.issue4-
dc.citation.beginningpage2122-
dc.citation.endingpage2137-
dc.citation.publicationnameIEEE-ACM TRANSACTIONS ON NETWORKING-
dc.identifier.doi10.1109/TNET.2017.2685560-
dc.contributor.localauthorYi, Yung-
dc.contributor.nonIdAuthorShin, Kyuyong-
dc.contributor.nonIdAuthorJoe-Wong, Carlee-
dc.contributor.nonIdAuthorHa, Sangtae-
dc.contributor.nonIdAuthorRhee, Injong-
dc.contributor.nonIdAuthorReeves, Douglas S.-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorCooperative communication-
dc.subject.keywordAuthorreciprocity-
dc.subject.keywordAuthorsymmetric encryption-
dc.subject.keywordPlusP2P-VOD SYSTEMS-
dc.subject.keywordPlusNETWORKS-
dc.subject.keywordPlusDESIGN-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 8 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0