共查询到20条相似文献,搜索用时 0 毫秒
1.
Peter R. Wurman Jie Zhong Gangshu Cai 《Electronic Commerce Research and Applications》2004,3(4):329-340
Proxy bidding has proven useful in a variety of real auction formats – most notably eBay – and has been proposed for the nascent field of combinatorial auctions. Previous work on proxy bidding in combinatorial auctions requires the auctioneer to run the auction with myopic bidders to determine the outcome. In this paper, we present a radically different approach that computes the bidders’ allocation of their attention across the bundles only at “inflection points”. Inflections are caused by the introduction of a new bundle into an agent’s demand set, a change in the set of currently competitive allocations, or the withdrawal of an agent from the set of active bidders. This approach has several advantages over alternatives, including that it computes exact solutions and is invariant to the magnitude of the bids. 相似文献
2.
一种HTTP代理服务器的设计与实现 总被引:2,自引:0,他引:2
提出了一种高性能的HTTP代理服务器的设计方案。介绍了HTTP代理服务器基本工作原理,代理服务器的总体设计框架和其中采用的用以提高性能的关键技术、进程池技术和缓存机制以及核心模块的具体实现流程。 相似文献
3.
As the Internet has become a more central aspect for information technology, so have concerns with supplying enough bandwidth
and serving web requests to end users in an appropriate time frame. Web caching was introduced in the 1990s to help decrease
network traffic, lessen user perceived lag, and reduce loads on origin servers by storing copies of web objects on servers
closer to end users as opposed to forwarding all requests to the origin servers. Since web caches have limited space, web
caches must effectively decide which objects are worth caching or replacing for other objects. This problem is known as cache replacement. We used neural networks to solve this problem and proposed the Neural Network Proxy Cache Replacement (NNPCR) method. The
goal of this research is to implement NNPCR in a real environment like Squid proxy server. In order to do so, we propose an
improved strategy of NNPCR referred to as NNPCR-2. We show how the improved model can be trained with up to twelve times more
data and gain a 5–10% increase in Correct Classification Ratio (CCR) than NNPCR. We implemented NNPCR-2 in Squid proxy server
and compared it with four other cache replacement strategies. In this paper, we use 84 times more data than NNPCR was tested
against and present exhaustive test results for NNPCR-2 with different trace files and neural network structures. Our results
demonstrate that NNPCR-2 made important, balanced decisions in relation to the hit rate and byte hit rate; the two performance
metrics most commonly used to measure the performance of web proxy caches. 相似文献
4.
Multimedia proxy plays an important role in multimedia streaming over wireless Internet. Since wireless network exhibits different characteristics from the Internet, multimedia proxy caching over wireless Internet faces additional challenges. In this paper, we present a study of cache replacement for a single server and server selection for multiple servers across wireless Internet. By considering multiple objectives of multimedia proxy, we design a unified cost metric to measure proxy performance in wireless Internet. Based on the defined unified cost metric, we propose a novel replacement algorithm for single-server and a new server-selection policy for multiple servers to improve the end-to-end performance such as throughput, media quality, and start-up latency. To effectively handle errors occurred on wireless link, channel-adaptive unequal error protection is deployed according to distinct quality of service requirements of layered or scalable media. Simulation results demonstrate that our approaches achieve significantly better performance than the known cache-replacement algorithms and sever selection schemes, respectively. 相似文献
5.
This study measures the value of website quality in terms of its impact on trust, intention to transact and price premiums.
Prior research on online auctions has focused on the use of reputation systems for building trust in online auction vendors
and subsequently to generate price premiums. This study examines the extent to which trust can be induced by improving the
quality of online auction listings. A survey of 701 eBay users is conducted which compares the price premiums of two nearly
identical online auction businesses, one that has online auction listings with a perceived high quality and the other that
has substantially lower perceived quality. Results of this study indicate that website quality can explain 49% of the variation
in the trust for eBay sellers. In fact, it shows that sellers with good website quality are all perceived to be equally trustworthy
regardless of their eBay reputation; whereas sellers with poor website quality are not perceived to be trustworthy even if
they have a high eBay reputation score. The results also show that the trust resulting from increased website quality increases
intention to transact and results in price premiums of 12% (on average) for sellers with higher quality listings. Theories
from marketing, economics, and social psychology are used to explain why website quality induces trust in unknown vendors
without providing any concrete evidence regarding the vendor’s past history. 相似文献
6.
Due to the high bandwidth requirement and rate variability of compressed video, delivering video across wide area networks (WANs) is a challenging issue. Proxy servers have been used to reduce network congestion and improve client access time on the Internet by caching passing data. We investigate ways to store or stage partial video in proxy servers to reduce the network bandwidth requirement over WAN. A client needs to access a portion of the video from a proxy server over a local area network (LAN) and the rest from a central server across a WAN. Therefore, client buffer requirement and video synchronization are to be considered. We study the tradeoffs between client buffer, storage requirement on the proxy server, and bandwidth requirement over WAN. Given a video delivery rate for the WAN, we propose several frame staging selection algorithms to determine the video frames to be stored in the proxy server. A scheme called chunk algorithm, which partitions a video into different segments (chunks of frames) with alternating chunks stored in the proxy server, is shown to offer the best tradeoff. We also investigate an efficient way to utilize client buffer when the combination of video streams from WAN and LAN is considered. 相似文献
7.
In nowadays World Wide Web topology, it is not difficult to find the presence of proxy servers. They reduce network traffic
through the cut down of repetitive information. However, traditional proxy server does not support multimedia streaming. One
of the reasons is that general scheduling strategy adopted by most of the traditional proxy servers does not provide real-time
support to multimedia services. Based on the concept of contractual scheduling, we have developed a proxy server that supports
real-time multimedia applications. Moreover, we developed the group scheduling mechanism to enable processing power transfer
between tasks that can hardly be achieved by traditional schedulers. They result in a substantially improved performance particularly
when both time-constrained and non-time-constrained processes coexist within the proxy server. In this paper, the design and
implementation of this proxy server and the proposed scheduler are detailed.
Wai-Kong Cheuk received the B.Eng. (Hons.) and M. Phil. degrees in 1996 and 2001, respectively, from the Hong Kong Polytechnic University,
where he is currently pursuing the Ph.D. degree. His main research interests include distributed operating systems and video
streaming.
Tai-Chiu Hsung (M'93) received the B.Eng. (Hons.) and Ph.D. degrees in electronic and information engineering in 1993 and 1998, respectively,
from the Hong Kong Polytechnic University, Hong Kong. In 1999, he joined the Hong Kong Polytechnic University as a Research
Fellow. His research interests include wavelet theory and applications, tomography, and fast algorithms. Dr. Hsung is also
a member of IEE.
Daniel Pak-Kong Lun (M'91) received his B.Sc. (Hons.) degree from the University of Essex, Essex, U.K., and the Ph.D. degree from the Hong Kong
Polytechnic University, Hung Hom, Hong Kong, in 1988 and 1991, respectively. He is currently an Associate Professor and the
Associate Head of the Department of Electronic and Information Engineering, the Hong Kong Polytechnic University. His research
interests include digital signal processing, wavelets, multimedia technology, and Internet technology. Dr. Lun was the Secretary,
Treasurer, Vice-Chairman, and Chairman of the IEEE Hong Kong Chapter of Signal Processing in 1994, 1995–1996, 1997–1998, 1999–2000,
respectively. He was the Finance Chair of 2003 IEEE International Conference on Acoustics, Speech and Signal Processing, held
in Hong Kong, in April 2003. He is a Chartered Engineer and a Corporate member of the IEE. 相似文献
8.
In this paper the problem of optimal control over a Markov queueing system with heterogeneous servers and a joint queue is
considered, which is also known in the literature as “the slow server problem.” The classical model is generalized here to
the case with delay and call serving penalties. It is proved here that the optimal control policy for servers’ activating
is of monotonic and threshold nature. 相似文献
9.
Kailash C. Madan 《International journal of systems science》2013,44(7):837-844
We analyse a single server queue with Poisson arrivals, two stages of heterogeneous service with different general (arbitrary) service time distributions and binomial schedule server vacations with deterministic (constant) vacation periods. After first-stage service the server must provide the second stage service. However, after the second stage service, he may take a vacation or may decide to stay on in the system. For convenience, we designate our model as M/G 1, G 2/D/1 queue. We obtain steady state probability generating function of the queue length for various states of the server. Results for some particular cases of interest such as M/Ek 1 , Ek 2 /D/1, M/M 1, M 2/D/1, M/E k /D/1 and M/G 1, G 2/1 have been obtained from the main results and some known results including M/Ek /1 and M/G/1 have been derived as particular cases of our particular cases. 相似文献
10.
Amos Beimel 《Distributed Computing》2007,19(3):237-252
Suppose that some parties are connected by an incomplete network of reliable and private channels. The parties cooperate to execute some protocol. However, the parties are curious—after the protocol terminates each party tries to learn information from the communication it heard. We say that a function can be computed privately in a network if there is a protocol in which each processor learns only the information implied by its input and the output of the function (in the information theoretic sense). The question we address in this paper is what functions can be privately computed in a given incomplete network. Every function can be privately computed in two-connected networks with at least three parties. Thus, the question is interesting only for non two-connected networks. Generalizing results of (Bläser et al. in J. Cryptol, 19(3): 341–357, 2006), we characterize the functions that can be computed privately in simple networks—networks with one separating vertex and no leaves. We then deal with private computations in arbitrary non two-connected networks: we reduce this question to private computations of related functions on trees, and give some sufficient conditions and necessary conditions on the functions that can be privately computed on trees. 相似文献
11.
12.
The technology advance in network has accelerated the development of multimedia applications over the wired and wireless communication.
To alleviate network congestion and to reduce latency and workload on multimedia servers, the concept of multimedia proxy
has been proposed to cache popular contents. Caching the data objects can relieve the bandwidth demand on the external network,
and reduce the average time to load a remote data object to local side. Since the effectiveness of a proxy server depends
largely on cache replacement policy, various approaches are proposed in recent years. In this paper, we discuss the cache
replacement policy in a multimedia transcoding proxy. Unlike the cache replacement for conventional web objects, to replace
some elements with others in the cache of a transcoding proxy, we should further consider the transcoding relationship among
the cached items. To maintain the transcoding relationship and to perform cache replacement, we propose in this paper the
RESP framework (standing for REplacement with Shortest Path). The RESP framework contains two primary components, i.e., procedure
MASP (standing for Minimum Aggregate Cost with Shortest Path) and algorithm EBR (standing for Exchange-Based Replacement).
Procedure MASP maintains the transcoding relationship using a shortest path table, whereas algorithm EBR performs cache replacement
according to an exchanging strategy. The experimental results show that the RESP framework can approximate the optimal cache
replacement with much lower execution time for processing user queries. 相似文献
13.
Finding similarities between two datasets is an important task in many research areas, particularly those of data mining, information retrieval, cloud computing, and biometrics. However, maintaining data protection and privacy while enabling similarity measurements has become a priority for data owners in recent years. In this paper, we study the design of an efficient and secure protocol to facilitate the Hamming distance computation between two semi-honest parties (a client and a server). In our protocol design, both parties are constrained to ensure that no extra information will be revealed other than the computed result (privacy is protected) and further, the output of the protocol is according to the prescribed functionality (correctness is guaranteed). In order to achieve these requirements, we utilize a multiplicative homomorphic cryptosystem and include chaff data into the computation. Two experimental results in this paper demonstrate the performance of both the client and the server. 相似文献
14.
《Expert systems with applications》2014,41(10):4829-4843
Multi-attribute auctions allow agents to sell and purchase goods and services taking into account more attributes than just price (e.g. service time, tolerances, qualities, etc.). In this paper we analyze attributes involved during the auction process and propose to classify them between verifiable attributes, unverifiable attributes and auctioneer provided attributes. According to this classification we present VMA2, a new Vickrey-based reverse multi-attribute auction mechanism, which takes into account the different types of attributes involved in the auction and allows the auction customization in order to suit the auctioneer needs. On the one hand, the use of auctioneer provided attributes enables the inclusion of different auction concepts, such as social welfare, trust or robustness whilst, on the other hand, the use of verifiable attributes guarantee truthful bidding. The paper exemplifies the behavior of VMA2 describing how an egalitarian allocation can be achieved. The mechanism is then tested in a simulated manufacturing environment and compared with other existing auction allocation methods. 相似文献
15.
Recommender systems combine ideas from information retrieval, user modelling, and artificial intelligence to focus on the
provision of more intelligent and proactive information services. As such, recommender systems play an important role when
it comes to assisting the user during both routine and specialised information retrieval tasks. Like any good assistant it
is important that users can trust in the ability of a recommender system to respond with timely and relevant suggestions. In this paper, we will look at a
collaborative recommendation system operating in the domain of Web search. We will show how explicit models of trust can help
to inform more reliable recommendations that translate into more relevant search results. Moreover, we demonstrate how the
availability of this trust-model facilitates important interface enhancements that provide a means to declare the provenance
of result recommendations in a way that will allow searchers to evaluate their likely relevance based on the reputation and
trustworthiness of the recommendation partners behind these suggestions. 相似文献
16.
A technique for computing the inter-departure time distribution for single server queues is presented. The method is applicable for both the steady state and the transient characterizations. Examples of its use in several situations are presented. An explicit expression for the interdeparture time distribution of a steady state G/M/1 queue is obtained. 相似文献
17.
Summary A E
n¦ M ¦ 1 queue is defined as a single server queue with exponential service time and general cyclic arrival distributions of cycle length n. The waiting time distribution for such a queue is proved to be a sum of n exponential terms; this is a generalization of G ¦ M ¦ 1 queue results. Based on this a method for obtaining the steady-state waiting time distributions for E
n¦ M ¦ 1 queues is introduced. An example is presented to show an application of E
n¦ M ¦ 1 queues in deterministic routing.The work was supported in part by the U.S. Air Force Office of Scientific Research under grant AFOSR 78-3654 A to the Department of Computer Science 相似文献
18.
Javier Herranz 《Information Sciences》2009,179(11):1647-3283
In some situations, a user wants to sign a message in such a way that only a designated verifier is convinced of the validity of the signature, whereas other users cannot distinguish whether the signer has signed this message at all. In some cases, the signer may want to preserve this level of privacy forever, which means that the initial verifier should not be able to convince anyone else of the fact that the signer signed the message. In some other cases, the signer may want to give the initial verifier the possibility to transfer his conviction to someone else (maybe to everybody), when/if desired.In this paper we review this notion of private signatures, focusing on the level of transferability desired by the signer. We first consider the two extreme cases (non-transferability and complete transferability) which can be generically and efficiently solved by using very basic cryptographic primitives, as we show in this paper. Then we consider a case with partial transferability, for which we propose a generic solution based on the primitive of distributed ring signatures. 相似文献
19.
20.
In this paper, we describe a novel bidding strategy that autonomous trading agents can use to participate in Continuous Double Auctions (CDAs). Our strategy is based on both short and long-term learning that allows such agents to adapt their bidding behaviour to be efficient in a wide variety of environments. For the short-term learning, the agent updates the aggressiveness of its bidding behaviour (more aggressive means it will trade off profit to improve its chance of transacting, less aggressive that it targets more profitable transactions and is willing to trade off its chance of transacting to achieve them) based on market information observed after any bid or ask appears in the market. The long-term learning then determines how this aggressiveness factor influences an agent's choice of which bids or asks to submit in the market, and is based on market information observed after every transaction (successfully matched bid and ask). The principal motivation for the short-term learning is to enable the agent to immediately respond to market fluctuations, while for the long-term learning it is to adapt to broader trends in the way in which the market demand and supply changes over time. We benchmark our strategy against the current state of the art (ZIP and GDX) and show that it outperforms these benchmarks in both static and dynamic environments. This is true both when the population is homogeneous (where the increase in efficiency is up to 5.2%) and heterogeneous (in which case there is a 0.85 probability of our strategy being adopted in a two-population evolutionary game theoretic analysis). 相似文献