-
1
-
-
85026378512
-
A survey on Internet of things: Architecture, enabling technologies, security and privacy, and applications
-
Oct.
-
J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, "A survey on Internet of things: Architecture, enabling technologies, security and privacy, and applications, " IEEE Internet Things J., vol. 4, no. 5, pp. 1125-1142, Oct. 2017.
-
(2017)
IEEE Internet Things J.
, vol.4
, Issue.5
, pp. 1125-1142
-
-
Lin, J.1
Yu, W.2
Zhang, N.3
Yang, X.4
Zhang, H.5
Zhao, W.6
-
2
-
-
84979828689
-
Internet of Things and big data analytics for smart and connected communities
-
Mar.
-
Y. Sun, H. Song, A. J. Jara, and R. Bie, "Internet of Things and big data analytics for smart and connected communities, " IEEE Access, vol. 4, pp. 766-773, Mar. 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 766-773
-
-
Sun, Y.1
Song, H.2
Jara, A.J.3
Bie, R.4
-
3
-
-
84906842496
-
Research directions for the Internet of Things
-
Feb.
-
J. A. Stankovic, "Research directions for the Internet of Things, " IEEE Internet Things J., vol. 1, no. 1, pp. 3-9, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 3-9
-
-
Stankovic, J.A.1
-
4
-
-
85030651432
-
Design and realization of W Internet: From net of things to Internet of Things
-
Nov.
-
J. Wu and W. Zhao, "Design and realization of W Internet: From net of things to Internet of Things, " ACM Trans. Cyber-Phys. Syst., vol. 1, no. 1, pp. 2: 1-2: 12, Nov. 2016. [Online]. Available: http://doi. acm. org/10. 1145/2872332
-
(2016)
ACM Trans. Cyber-Phys. Syst.
, vol.1
, Issue.1
, pp. 21-212
-
-
Wu, J.1
Zhao, W.2
-
5
-
-
84987899075
-
On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems
-
Oct.
-
X. Yang, X. Ren, J. Lin, and W. Yu, "On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 10, pp. 2967-2983, Oct. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.10
, pp. 2967-2983
-
-
Yang, X.1
Ren, X.2
Lin, J.3
Yu, W.4
-
6
-
-
84908397157
-
Internet of Things for smart cities
-
Feb.
-
A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, "Internet of Things for smart cities, " IEEE Internet Things J., vol. 1, no. 1, pp. 22-32, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 22-32
-
-
Zanella, A.1
Bui, N.2
Castellani, A.3
Vangelista, L.4
Zorzi, M.5
-
7
-
-
85030636744
-
Smart city: The state of the art, datasets, and evaluation platforms
-
May
-
S. Mallapuram, N. Ngwum, F. Yuan, C. Lu, andW. Yu, "Smart city: The state of the art, datasets, and evaluation platforms, " in Proc. IEEE/ACIS 16th Int. Conf. Comput. Inf. Sci. (ICIS), May 2017, pp. 447-452.
-
(2017)
Proc. IEEE/ACIS 16th Int. Conf. Comput. Inf. Sci. (ICIS)
, pp. 447-452
-
-
Mallapuram, S.1
Ngwum, N.2
Yuan, F.3
Lu, C.4
Yu, W.5
-
8
-
-
85037046778
-
User differentiated verifiable file search on the cloud
-
to be published
-
F. Chen, T. Xiang, X. Fu, and W. Yu, "User differentiated verifiable file search on the cloud, " IEEE Trans. Service Comput., to be published.
-
IEEE Trans. Service Comput.
-
-
Chen, F.1
Xiang, T.2
Fu, X.3
Yu, W.4
-
9
-
-
84923318381
-
Big data deep learning: Challenges and perspectives
-
X.-W. Chen and X. Lin "Big data deep learning: Challenges and perspectives, " IEEE Access, vol. 2, pp. 514-525, 2014.
-
(2014)
IEEE Access
, vol.2
, pp. 514-525
-
-
Chen, X.-W.1
Lin, X.2
-
10
-
-
84949671050
-
A cloud computing based network monitoring and threat detection system for critical infrastructures
-
Apr.
-
Z. Chen et al., "A cloud computing based network monitoring and threat detection system for critical infrastructures, " Big Data Res., vol. 3, pp. 10-23, Apr. 2016.
-
(2016)
Big Data Res.
, vol.3
, pp. 10-23
-
-
Chen, Z.1
-
11
-
-
85044929356
-
A survey on the edge computing for the Internet of Things
-
to be published
-
W. Yu et al., "A survey on the edge computing for the Internet of Things, " IEEE Access, to be published.
-
IEEE Access
-
-
Yu, W.1
-
12
-
-
84893536420
-
A cloud computing based architecture for cyber security situation awareness
-
Oct.
-
W. Yu, G. Xu, Z. Chen, and P. Moulema, "A cloud computing based architecture for cyber security situation awareness, " in Proc. IEEE Conf. Commun. Netw. Security (CNS), Oct. 2013, pp. 488-492.
-
(2013)
Proc. IEEE Conf. Commun. Netw. Security (CNS)
, pp. 488-492
-
-
Yu, W.1
Xu, G.2
Chen, Z.3
Moulema, P.4
-
13
-
-
85035762670
-
System design perspective for human-level agents using deep reinforcement learning: A survey
-
N. D. Nguyen, T. Nguyen, and S. Nahavandi, "System design perspective for human-level agents using deep reinforcement learning: A survey, " IEEE Access, vol. 5, pp. 27091-27102, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 27091-27102
-
-
Nguyen, N.D.1
Nguyen, T.2
Nahavandi, S.3
-
14
-
-
68549133155
-
Learning from imbalanced data
-
Sep.
-
H. He and E. A. Garcia, "Learning from imbalanced data, " IEEE Trans. Knowl. Data Eng., vol. 21, no. 9, pp. 1263-1284, Sep. 2009.
-
(2009)
IEEE Trans. Knowl. Data Eng.
, vol.21
, Issue.9
, pp. 1263-1284
-
-
He, H.1
Garcia, E.A.2
-
15
-
-
0039625789
-
An 'all you can eat' price is clogging Internet access
-
Dec.
-
P. Lewis, "An 'all you can eat' price is clogging Internet access, " New York Times, vol. 17, p. A1, Dec. 1996.
-
(1996)
New York Times
, vol.17
, pp. A1
-
-
Lewis, P.1
-
16
-
-
84992349083
-
A pricing model for big personal data
-
Y. Shen, B. Guo, Y. Shen, X. Duan, X. Dong, and H. Zhang, "A pricing model for big personal data, " Tsinghua Sci. Technol., vol. 21, no. 5, pp. 482-490, 2016.
-
(2016)
Tsinghua Sci. Technol.
, vol.21
, Issue.5
, pp. 482-490
-
-
Shen, Y.1
Guo, B.2
Shen, Y.3
Duan, X.4
Dong, X.5
Zhang, H.6
-
17
-
-
85028322096
-
Big data challenges and opportunities in the hype of industry 4. 0
-
M. Khan, X. Wu, X. Xu, andW. Dou, "Big data challenges and opportunities in the hype of industry 4. 0, " in Proc. ICC, May 2017, pp. 1-6.
-
(2017)
Proc. ICC, May
, pp. 1-6
-
-
Khan, M.1
Wu, X.2
Xu, X.3
Dou, W.4
-
18
-
-
85044961917
-
Data trading with multiple owners, collectors, and users: An iterative auction mechanism
-
Feb.
-
X. Cao, Y. Chen, and K. R. Liu, "Data trading with multiple owners, collectors, and users: An iterative auction mechanism, " IEEE Trans. Signal Inf. Process. Netw., vol. 3, no. 2, pp. 268-281, Feb. 2017.
-
(2017)
IEEE Trans. Signal Inf. Process. Netw.
, vol.3
, Issue.2
, pp. 268-281
-
-
Cao, X.1
Chen, Y.2
Liu, K.R.3
-
19
-
-
84897562213
-
Big-data applications in the government sector
-
G.-H. Kim, S. Trimi, and J.-H. Chung, "Big-data applications in the government sector, " Commun. ACM, vol. 57, no. 3, pp. 78-85, 2014.
-
(2014)
Commun. ACM
, vol.57
, Issue.3
, pp. 78-85
-
-
Kim, G.-H.1
Trimi, S.2
Chung, J.-H.3
-
20
-
-
85015166958
-
Toward integrating distributed energy resources and storage devices in smart grid
-
Feb.
-
G. Xu, W. Yu, D. Griffith, N. Golmie, and P. Moulema, "Toward integrating distributed energy resources and storage devices in smart grid, " IEEE Internet Things J., vol. 4, no. 1, pp. 192-204, Feb. 2017.
-
(2017)
IEEE Internet Things J.
, vol.4
, Issue.1
, pp. 192-204
-
-
Xu, G.1
Yu, W.2
Griffith, D.3
Golmie, N.4
Moulema, P.5
-
21
-
-
84961720902
-
Towards multistep electricity prices in smart grid electricity markets
-
Jan.
-
J. Lin, W. Yu, and X. Yang, "Towards multistep electricity prices in smart grid electricity markets, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 286-302, Jan. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.1
, pp. 286-302
-
-
Lin, J.1
Yu, W.2
Yang, X.3
-
22
-
-
85015738123
-
A real-time enroute route guidance decision scheme for transportation-based cyberphysical systems
-
Mar.
-
J. Lin, W. Yu, X. Yang, Q. Yang, X. Fu, and W. Zhao, "A real-time enroute route guidance decision scheme for transportation-based cyberphysical systems, " IEEE Trans. Veh. Technol., vol. 66, no. 3, pp. 2551-2566, Mar. 2017.
-
(2017)
IEEE Trans. Veh. Technol.
, vol.66
, Issue.3
, pp. 2551-2566
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Yang, Q.4
Fu, X.5
Zhao, W.6
-
27
-
-
85104094046
-
Big data analytics in healthcare: Promise and potential
-
W. Raghupathi and V. Raghupathi, "Big data analytics in healthcare: Promise and potential, " Health Inf. Sci. Syst., vol. 2, no. 1, p. 3, 2014.
-
(2014)
Health Inf. Sci. Syst.
, vol.2
, Issue.1
, pp. 3
-
-
Raghupathi, W.1
Raghupathi, V.2
-
28
-
-
78751497089
-
-
(2010). Data, Data Everywhere. [Online]. Available: http://www. economist. com/node/15557443
-
(2010)
Data, Data Everywhere
-
-
-
29
-
-
84901392714
-
Performance evaluation of NoSQL big-data applications using multi-formalism models
-
Jul.
-
E. Barbierato, M. Gribaudo, and M. Iacono, "Performance evaluation of NoSQL big-data applications using multi-formalism models, " Future Generat. Comput. Syst., vol. 37, pp. 345-353, Jul. 2014.
-
(2014)
Future Generat. Comput. Syst.
, vol.37
, pp. 345-353
-
-
Barbierato, E.1
Gribaudo, M.2
Iacono, M.3
-
30
-
-
84870243255
-
The SIMTHESys multiformalism modeling framework
-
M. Iacono, E. Barbierato, and M. Gribaudo, "The SIMTHESys multiformalism modeling framework, " Comput. Math. Appl., vol. 64, no. 12, pp. 3828-3839, 2012.
-
(2012)
Comput. Math. Appl.
, vol.64
, Issue.12
, pp. 3828-3839
-
-
Iacono, M.1
Barbierato, E.2
Gribaudo, M.3
-
31
-
-
80055014024
-
Defin ing formalisms for performance evaluation with SIMTHESys
-
Sep.
-
E. Barbierato, M. Gribaudo, and M. Iacono, "defin ing formalisms for performance evaluation with SIMTHESys, " Electron. Notes Theor. Comput. Sci., vol. 275, pp. 37-51, Sep. 2011.
-
(2011)
Electron. Notes Theor. Comput. Sci.
, vol.275
, pp. 37-51
-
-
Barbierato, E.1
Gribaudo, M.2
Iacono, M.3
-
33
-
-
1642540724
-
AToM3: A tool for multi-formalism and meta-modelling
-
J. De Lara and H. Vangheluwe, "AToM3: A tool for multi-formalism and meta-modelling, " in Proc. FASE, vol. 2. 2002, pp. 174-188.
-
(2002)
Proc. FASE
, vol.2
, pp. 174-188
-
-
De Lara, J.1
Vangheluwe, H.2
-
34
-
-
26444489108
-
The OsMoSys approach to multi-formalism modeling of systems
-
V. Vittorini, M. Iacono, N. Mazzocca, and G. Franceschinis, "The OsMoSys approach to multi-formalism modeling of systems, " Softw. Syst. Model., vol. 3, no. 1, pp. 68-81, 2004.
-
(2004)
Softw. Syst. Model.
, vol.3
, Issue.1
, pp. 68-81
-
-
Vittorini, V.1
Iacono, M.2
Mazzocca, N.3
Franceschinis, G.4
-
37
-
-
85044971238
-
-
(2016). Why do Machine Learning on Big Data? [Online]. Available: http://www. skytree. net/machine-learning/why-do-machine-learning-bigdata/
-
(2016)
Why Do Machine Learning on Big Data?
-
-
-
38
-
-
84900800509
-
Data-intensive applications, challenges, techniques and technologies: A survey on big data
-
Aug.
-
C. L. P. Chen and C.-Y. Zhang, "Data-intensive applications, challenges, techniques and technologies: A survey on big data, " Inf. Sci., vol. 275, pp. 314-347, Aug. 2014.
-
(2014)
Inf. Sci.
, vol.275
, pp. 314-347
-
-
Chen, C.L.P.1
Zhang, C.-Y.2
-
40
-
-
84929509763
-
How 'big data' can make big impact: Findings from a systematic review and a longitudinal case study
-
Jul.
-
S. F. Wamba, S. Akter, A. Edwards, G. Chopin, and D. Gnanzou, "How 'big data' can make big impact: Findings from a systematic review and a longitudinal case study, " Int. J. Prod. Econ., vol. 165, pp. 234-246, Jul. 2015.
-
(2015)
Int. J. Prod. Econ.
, vol.165
, pp. 234-246
-
-
Wamba, S.F.1
Akter, S.2
Edwards, A.3
Chopin, G.4
Gnanzou, D.5
-
41
-
-
30344473967
-
Competing on analytics
-
T. H. Davenport, "Competing on analytics, " Harvard Bus. Rev., vol. 84, no. 1, p. 98, 2006.
-
(2006)
Harvard Bus. Rev.
, vol.84
, Issue.1
, pp. 98
-
-
Davenport, T.H.1
-
42
-
-
84871857828
-
Big data: The management revolution
-
A. McAfee et al., "Big data: The management revolution, " Harvard Bus. Rev., vol. 90, no. 10, pp. 60-68, 2012.
-
(2012)
Harvard Bus. Rev.
, vol.90
, Issue.10
, pp. 60-68
-
-
McAfee, A.1
-
43
-
-
81055138684
-
-
Washington, DC, USA: McKinsey Global Institute
-
J. Manyika et al., Big Data: The Next Frontier for Innovation, Competition, and Productivity. Washington, DC, USA: McKinsey Global Institute, 2011.
-
(2011)
Big Data: The Next Frontier for Innovation, Competition, and Productivity
-
-
Manyika, J.1
-
44
-
-
84907331440
-
Analytics: The real-world use of big data
-
Dec.
-
M. Schroeck, R. Shockley, J. Smart, D. Romero-Morales, and P. Tufano, "Analytics: The real-world use of big data, " IBM Global Bus. Services, vol. 12, pp. 1-20, Dec. 2012.
-
(2012)
IBM Global Bus. Services
, vol.12
, pp. 1-20
-
-
Schroeck, M.1
Shockley, R.2
Smart, J.3
Romero-Morales, D.4
Tufano, P.5
-
46
-
-
84890419941
-
Data mining with big data
-
Jan.
-
X. Wu, X. Zhu, G.-Q. Wu, and W. Ding, "Data mining with big data, " IEEE Trans. Knowl. Data Eng., vol. 26, no. 1, pp. 97-107, Jan. 2014.
-
(2014)
IEEE Trans. Knowl. Data Eng.
, vol.26
, Issue.1
, pp. 97-107
-
-
Wu, X.1
Zhu, X.2
Wu, G.-Q.3
Ding, W.4
-
47
-
-
84863610828
-
Big data analytics
-
4th Quart.
-
P. Russom et al., "Big data analytics, " TDWI Best Practices Rep., vol. 19, p. 40, 4th Quart., 2011.
-
(2011)
TDWI Best Practices Rep.
, vol.19
, pp. 40
-
-
Russom, P.1
-
49
-
-
49349126835
-
Monopoly and product quality
-
M. Mussa and S. Rosen, "Monopoly and product quality, " J. Econ. Theory, vol. 18, no. 2, pp. 301-317, 1978.
-
(1978)
J. Econ. Theory
, vol.18
, Issue.2
, pp. 301-317
-
-
Mussa, M.1
Rosen, S.2
-
50
-
-
84992374598
-
Pricing approaches for data markets
-
Berlin, Germany: Springer
-
A. Muschalle, F. Stahl, A. Löser, and G. Vossen, "Pricing approaches for data markets, " in InternationalWorkshop on Business Intelligence for the Real-Time Enterprise. Berlin, Germany: Springer, 2012, pp. 129-144.
-
(2012)
InternationalWorkshop on Business Intelligence for the Real-Time Enterprise
, pp. 129-144
-
-
Muschalle, A.1
Stahl, F.2
Löser, A.3
Vossen, G.4
-
51
-
-
79960001828
-
Predicting cost amortization for query services
-
D. Dash et al., "Predicting cost amortization for query services, " in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2011, pp. 325-336.
-
(2011)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 325-336
-
-
Dash, D.1
-
53
-
-
84941085241
-
Internet of Things: A survey on enabling technologies, protocols, and applications
-
4th Quart.
-
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A survey on enabling technologies, protocols, and applications, " IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347-2376, 4th Quart., 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.4
, pp. 2347-2376
-
-
Al-Fuqaha, A.1
Guizani, M.2
Mohammadi, M.3
Aledhari, M.4
Ayyash, M.5
-
54
-
-
85043346268
-
An integrated simulation study on reliable and effective distributed energy resources in smart grid
-
S. Mallapuram, W. Yu, P. Moulema, D. W. Griffith, N. T. Golmie, and F. Liang, "An integrated simulation study on reliable and effective distributed energy resources in smart grid, " in Proc. ACM Int. Conf. Res. Adapt. Convergent Syst. (RACS), 2017, pp. 140-145.
-
(2017)
Proc. ACM Int. Conf. Res. Adapt. Convergent Syst. (RACS)
, pp. 140-145
-
-
Mallapuram, S.1
Yu, W.2
Moulema, P.3
Griffith, D.W.4
Golmie, N.T.5
Liang, F.6
-
56
-
-
84999748172
-
Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey
-
4th Quart.
-
N. C. Luong, D. T. Hoang, P. Wang, D. Niyato, D. I. Kim, and Z. Han, "Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey, " IEEE Commun. Surveys Tuts., vol. 18, no. 4, pp. 2546-2590, 4th Quart., 2016.
-
(2016)
IEEE Commun. Surveys Tuts.
, vol.18
, Issue.4
, pp. 2546-2590
-
-
Luong, N.C.1
Hoang, D.T.2
Wang, P.3
Niyato, D.4
Kim, D.I.5
Han, Z.6
-
59
-
-
85044952964
-
Commodity futures prices: Some evidence on forecast power, premiums, and the theory of storage
-
Singapore: World Scientific
-
E. F. Fama and K. R. French, "Commodity futures prices: Some evidence on forecast power, premiums, and the theory of storage, " in The World Scientific Handbook of Futures Markets. Singapore: World Scientific, 2016, pp. 79-102.
-
(2016)
The World Scientific Handbook of Futures Markets
, pp. 79-102
-
-
Fama, E.F.1
French, K.R.2
-
60
-
-
78650760278
-
Pricing strategies for information technology services: A value-based approach
-
R. Harmon, H. Demirkan, B. HeEy, and N. Auseklis, "Pricing strategies for information technology services: A value-based approach, " in Proc. 42nd Hawaii Int. Conf. Syst. Sci. (HICSS), 2009, pp. 1-10.
-
(2009)
Proc. 42nd Hawaii Int. Conf. Syst. Sci. (HICSS)
, pp. 1-10
-
-
Harmon, R.1
Demirkan, H.2
HeEy, B.3
Auseklis, N.4
-
61
-
-
0002051223
-
The oligopoly solution conceptis identified
-
T. F. Bresnahan, "The oligopoly solution conceptis identified, " Econ. Lett., vol. 10, nos. 1-2, pp. 87-92, 1982.
-
(1982)
Econ. Lett.
, vol.10
, Issue.1-2
, pp. 87-92
-
-
Bresnahan, T.F.1
-
62
-
-
79959682688
-
Rational fools: A critique of the behavioral foundations of economic theory
-
A. K. Sen, "Rational fools: A critique of the behavioral foundations of economic theory, " Philosophy Public Affairs, vol. 6, no. 4, pp. 317-344, 1977.
-
(1977)
Philosophy Public Affairs
, vol.6
, Issue.4
, pp. 317-344
-
-
Sen, A.K.1
-
63
-
-
0001730497
-
Non-cooperative games
-
J. Nash, "Non-cooperative games, " Ann. Math., vol. 54, no. 2, pp. 286-295, 1951.
-
(1951)
Ann. Math.
, vol.54
, Issue.2
, pp. 286-295
-
-
Nash, J.1
-
64
-
-
0034297879
-
A game theoretic framework for bandwidth allocation and pricing in broadband networks
-
May
-
H. Yaïche, R. R. Mazumdar, and C. Rosenberg, "A game theoretic framework for bandwidth allocation and pricing in broadband networks, " IEEE/ACM Trans. Netw., vol. 8, no. 5, pp. 667-678, May 2000.
-
(2000)
IEEE/ACM Trans. Netw.
, vol.8
, Issue.5
, pp. 667-678
-
-
Yaïche, H.1
Mazumdar, R.R.2
Rosenberg, C.3
-
65
-
-
84944618434
-
A non-cooperative equilibrium for supergames
-
J. W. Friedman, "A non-cooperative equilibrium for supergames, " Rev. Econ. Stud., vol. 38, no. 1, pp. 1-12, 1971.
-
(1971)
Rev. Econ. Stud.
, vol.38
, Issue.1
, pp. 1-12
-
-
Friedman, J.W.1
-
66
-
-
84859206884
-
Price-based resource allocation for spectrum-sharing femtocell networks: A stackelberg game approach
-
Apr.
-
X. Kang, R. Zhang, and M. Motani, "Price-based resource allocation for spectrum-sharing femtocell networks: A stackelberg game approach, " IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 538-549, Apr. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.3
, pp. 538-549
-
-
Kang, X.1
Zhang, R.2
Motani, M.3
-
67
-
-
84978259360
-
Pricing-based stackelberg game for spectrum trading in self-organised heterogeneous networks
-
Nov.
-
S. Haddadi and A. Ghasemi, "Pricing-based stackelberg game for spectrum trading in self-organised heterogeneous networks, " IET Commun., vol. 10, no. 11, pp. 1374-1383, Nov. 2016.
-
(2016)
IET Commun.
, vol.10
, Issue.11
, pp. 1374-1383
-
-
Haddadi, S.1
Ghasemi, A.2
-
68
-
-
84864114260
-
Competition and cooperation between participants of the Internet of Things industry value chain
-
X. Lv, R. Zhang, and J. Yue, "Competition and cooperation between participants of the Internet of Things industry value chain, " Adv. Inf. Sci. Service Sci., vol. 4, no. 11, pp. 406-412, 2012.
-
(2012)
Adv. Inf. Sci. Service Sci.
, vol.4
, Issue.11
, pp. 406-412
-
-
Lv, X.1
Zhang, R.2
Yue, J.3
-
69
-
-
85014099193
-
Stackelberg-game-based dynamic spectrum access in heterogeneous wireless systems
-
Dec.
-
D. B. Rawat, S. Shetty, and C. Xin, "Stackelberg-game-based dynamic spectrum access in heterogeneous wireless systems, " IEEE Syst. J., vol. 10, no. 4, pp. 1494-1504, Dec. 2016.
-
(2016)
IEEE Syst. J.
, vol.10
, Issue.4
, pp. 1494-1504
-
-
Rawat, D.B.1
Shetty, S.2
Xin, C.3
-
70
-
-
40949092751
-
Inner supervision in multi-sensor data fusion using the concepts of stackelberg games
-
Sep.
-
A. Danak, A. R. Kian, and B. Moshiri, "Inner supervision in multi-sensor data fusion using the concepts of stackelberg games, " in Proc. IEEE Int. Conf. Multisensor Fusion Integr. Intell. Syst., Sep. 2006, pp. 65-70.
-
(2006)
Proc. IEEE Int. Conf. Multisensor Fusion Integr. Intell. Syst.
, pp. 65-70
-
-
Danak, A.1
Kian, A.R.2
Moshiri, B.3
-
71
-
-
85036470311
-
A strategic bargaining game for a spectrum sharing scheme in cognitive radio-based heterogeneous wireless sensor networks
-
Y. Mao, T. Cheng, H. Zhao, and N. Shen, "A strategic bargaining game for a spectrum sharing scheme in cognitive radio-based heterogeneous wireless sensor networks, " Sensors, vol. 17, no. 12, p. 2737, 2017.
-
(2017)
Sensors
, vol.17
, Issue.12
, pp. 2737
-
-
Mao, Y.1
Cheng, T.2
Zhao, H.3
Shen, N.4
-
73
-
-
84933557961
-
Cooperative primary secondary dynamic spectrum leasing game via decentralized bargaining
-
S. M. Azimi, M. H. Manshaei, and F. Hendessi, "Cooperative primary secondary dynamic spectrum leasing game via decentralized bargaining, " Wireless Netw., vol. 22, no. 3, pp. 755-764, 2016.
-
(2016)
Wireless Netw.
, vol.22
, Issue.3
, pp. 755-764
-
-
Azimi, S.M.1
Manshaei, M.H.2
Hendessi, F.3
-
74
-
-
84962168824
-
Joint power coordination for spectral-and-energy efficiency in heterogeneous small cell networks: A bargaining game-theoretic perspective
-
Feb.
-
C. Yang, J. Li, A. Anpalagan, and M. Guizani, "Joint power coordination for spectral-and-energy efficiency in heterogeneous small cell networks: A bargaining game-theoretic perspective, " IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 1364-1376, Feb. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.2
, pp. 1364-1376
-
-
Yang, C.1
Li, J.2
Anpalagan, A.3
Guizani, M.4
-
75
-
-
85027439251
-
An online pricing mechanism for mobile crowdsensing data markets
-
Z. Zheng, Y. Peng, F. Wu, S. Tang, and G. Chen, "An online pricing mechanism for mobile crowdsensing data markets, " in Proc. 18th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2017, p. 26.
-
(2017)
Proc. 18th ACM Int. Symp. Mobile Ad Hoc Netw. Comput
, pp. 26
-
-
Zheng, Z.1
Peng, Y.2
Wu, F.3
Tang, S.4
Chen, G.5
-
76
-
-
84946601316
-
Querybased data pricing
-
P. Koutris, P. Upadhyaya, M. Balazinska, B. Howe, and D. Suciu, "Querybased data pricing, " J. ACM, vol. 62, no. 5, p. 43, 2015.
-
(2015)
J. ACM
, vol.62
, Issue.5
, pp. 43
-
-
Koutris, P.1
Upadhyaya, P.2
Balazinska, M.3
Howe, B.4
Suciu, D.5
-
77
-
-
84963986270
-
Smart data pricing models for the Internet of Things: A bundling strategy approach
-
Feb.
-
D. Niyato, D. T. Hoang, N. C. Luong, P. Wang, D. I. Kim, and Z. Han, "Smart data pricing models for the Internet of Things: A bundling strategy approach, " IEEE Netw., vol. 30, no. 2, pp. 18-25, Feb. 2016.
-
(2016)
IEEE Netw.
, vol.30
, Issue.2
, pp. 18-25
-
-
Niyato, D.1
Hoang, D.T.2
Luong, N.C.3
Wang, P.4
Kim, D.I.5
Han, Z.6
-
78
-
-
85044968323
-
Versioning 2. 0: A product line and pricing model for information goods under usage constraints and with R&D costs
-
Minneapolis, MN, USA, Oct.
-
R. K. Chellappa and A. Mehra, "Versioning 2. 0: A product line and pricing model for information goods under usage constraints and with R&D costs, " in Proc. Conf. Inf. Syst. Technol., Minneapolis, MN, USA, Oct. 2013, pp. 5-6.
-
(2013)
Proc. Conf. Inf. Syst. Technol.
, pp. 5-6
-
-
Chellappa, R.K.1
Mehra, A.2
-
79
-
-
84981294854
-
Market model and optimal pricing scheme of big data and Internet of Things (IoT)
-
May
-
D. Niyato, M. A. Alsheikh, P. Wang, D. I. Kim, and Z. Han, "Market model and optimal pricing scheme of big data and Internet of Things (IoT), " in Proc. IEEE Int. Conf. Commun. (ICC), May 2016, pp. 1-6.
-
(2016)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 1-6
-
-
Niyato, D.1
Alsheikh, M.A.2
Wang, P.3
Kim, D.I.4
Han, Z.5
-
80
-
-
84924369699
-
Smart data pricing (SDP): Economic solutions to network congestion
-
Apr.
-
S. Sen, C. Joe-Wong, S. Ha, and M. Chiang, "Smart data pricing (SDP): Economic solutions to network congestion, " Recent Adv. Netw., vol. 1, pp. 221-274, Apr. 2013.
-
(2013)
Recent Adv. Netw.
, vol.1
, pp. 221-274
-
-
Sen, S.1
Joe-Wong, C.2
Ha, S.3
Chiang, M.4
-
81
-
-
85019198438
-
Time-dependent smart data pricing based on machine learning
-
Y.-C. Tsai et al., "Time-dependent smart data pricing based on machine learning, " in Proc. Can. Conf. Artif. Intell., 2017, pp. 103-108.
-
(2017)
Proc. Can. Conf. Artif. Intell.
, pp. 103-108
-
-
Tsai, Y.-C.1
-
82
-
-
85027504491
-
Data pricing strategy based on data quality
-
Oct.
-
H. Yu and M. Zhang, "Data pricing strategy based on data quality, " Comput. Ind. Eng., vol. 112, pp. 1-10, Oct. 2017.
-
(2017)
Comput. Ind. Eng.
, vol.112
, pp. 1-10
-
-
Yu, H.1
Zhang, M.2
-
84
-
-
84959220728
-
The stickiness intention of group-buying websites: The integration of the commitment fitrust theory and e-commerce success model
-
W.-T. Wang, Y.-S. Wang, and E.-R. Liu, "The stickiness intention of group-buying websites: The integration of the commitment fitrust theory and e-commerce success model, " Inf. Manage., vol. 53, no. 5, pp. 625-642, 2016.
-
(2016)
Inf. Manage.
, vol.53
, Issue.5
, pp. 625-642
-
-
Wang, W.-T.1
Wang, Y.-S.2
Liu, E.-R.3
-
85
-
-
84880065191
-
-
McKinsey & Company, Washington, DC, USA, Tech. Rep.
-
P. Groves, B. Kayyali, D. Knott, and S. V. Kuiken, "The 'big data' revolution in healthcare: Accelerating value and innovation, " McKinsey & Company, Washington, DC, USA, Tech. Rep., 2016.
-
(2016)
The 'Big Data' Revolution in Healthcare: Accelerating Value and Innovation
-
-
Groves, P.1
Kayyali, B.2
Knott, D.3
Kuiken, S.V.4
-
86
-
-
85021188175
-
Trading data in good faith: Integrating truthfulness and privacy preservation in data markets
-
Apr.
-
C. Niu, Z. Zheng, F. Wu, X. Gao, and G. Chen, "Trading data in good faith: Integrating truthfulness and privacy preservation in data markets, " in Proc. IEEE 33rd Int. Conf. Data Eng. (ICDE), Apr. 2017, pp. 223-226.
-
(2017)
Proc. IEEE 33rd Int. Conf. Data Eng. (ICDE)
, pp. 223-226
-
-
Niu, C.1
Zheng, Z.2
Wu, F.3
Gao, X.4
Chen, G.5
-
88
-
-
85019761683
-
Profit maximization auction and data management in big data markets
-
May
-
Y. Jiao, P. Wang, D. Niyato, M. A. Alsheikh, and S. Feng, "Profit maximization auction and data management in big data markets, " in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), May 2017, pp. 1-6.
-
(2017)
Proc. IEEE Wireless Commun. Netw. Conf. (WCNC)
, pp. 1-6
-
-
Jiao, Y.1
Wang, P.2
Niyato, D.3
Alsheikh, M.A.4
Feng, S.5
-
89
-
-
85044945010
-
-
Mar. 9 U. S. Patent
-
H. M. Getson, S. Vallie, A. Peterson, and K. Rodriguez, "Systems and methods for allocating capital to trading strategies for big data trading in financial markets, " U. S. Patent 14 642 577, Mar. 9, 2015.
-
(2015)
Systems and Methods for Allocating Capital to Trading Strategies for Big Data Trading in Financial Markets
-
-
Getson, H.M.1
Vallie, S.2
Peterson, A.3
Rodriguez, K.4
-
90
-
-
84912129071
-
Secure ranked multi-keyword search for multiple data owners in cloud computing
-
W. Zhang, S. Xiao, Y. Lin, T. Zhou, and S. Zhou, "Secure ranked multi-keyword search for multiple data owners in cloud computing, " in Proc. 44th Annu. IEEE/IFIP Int. Conf. Depend. Syst. Netw. (DSN), 2014, pp. 276-286.
-
(2014)
Proc. 44th Annu. IEEE/IFIP Int. Conf. Depend. Syst. Netw. (DSN)
, pp. 276-286
-
-
Zhang, W.1
Xiao, S.2
Lin, Y.3
Zhou, T.4
Zhou, S.5
-
91
-
-
84963939892
-
Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing
-
May
-
W. Zhang, Y. Lin, S. Xiao, J. Wu, and S. Zhou, "Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing, " IEEE Trans. Comput., vol. 65, no. 5, pp. 1566-1577, May 2016.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.5
, pp. 1566-1577
-
-
Zhang, W.1
Lin, Y.2
Xiao, S.3
Wu, J.4
Zhou, S.5
-
92
-
-
84950283992
-
A fair data market system with data quality evaluation and repairing recommendation
-
X. Ding, H. Wang, D. Zhang, J. Li, and H. Gao, "A fair data market system with data quality evaluation and repairing recommendation, " in Proc. Asia-Pacific Web Conf., 2015, pp. 855-858.
-
(2015)
Proc. Asia-Pacific Web Conf.
, pp. 855-858
-
-
Ding, X.1
Wang, H.2
Zhang, D.3
Li, J.4
Gao, H.5
-
93
-
-
85026249480
-
Economics of mobile data trading market
-
J. Yu, M. H. Cheung, and J. Huang, "Economics of mobile data trading market, " in Proc. 15th Int. Symp. Modeling Optim. Mobile, Ad Hoc, Wireless Netw. (WiOpt), 2017, pp. 1-8.
-
(2017)
Proc. 15th Int. Symp. Modeling Optim. Mobile, Ad Hoc, Wireless Netw. (WiOpt)
, pp. 1-8
-
-
Yu, J.1
Cheung, M.H.2
Huang, J.3
-
94
-
-
85070252439
-
A fair protocol for data trading based on bitcoin transactions
-
Aug.
-
S. Delgado-Segura, C. Pérez-Solà, G. Navarro-Arribas, and J. Herrera-Joancomartí, "A fair protocol for data trading based on bitcoin transactions, " Future Generat. Comput. Syst., vol. 34, no. 7, p. 1, Aug. 2017.
-
(2017)
Future Generat. Comput. Syst.
, vol.34
, Issue.7
, pp. 1
-
-
Delgado-Segura, S.1
Pérez-Solà, C.2
Navarro-Arribas, G.3
Herrera-Joancomartí, J.4
-
95
-
-
85027245531
-
Effective mobile data trading in secondary ad-hoc market with heterogeneous and dynamic environment
-
Jun.
-
H. Susanto, H. Zhang, S.-Y. Ho, and B. Liu, "Effective mobile data trading in secondary ad-hoc market with heterogeneous and dynamic environment, " in Proc. IEEE 37th Int. Conf. Distrib. Comput. Syst. (ICDCS), Jun. 2017, pp. 645-655.
-
(2017)
Proc. IEEE 37th Int. Conf. Distrib. Comput. Syst. (ICDCS)
, pp. 645-655
-
-
Susanto, H.1
Zhang, H.2
Ho, S.-Y.3
Liu, B.4
-
96
-
-
85044938834
-
-
Ph. D. dissertation, Faculty Graduate School, Univ. Maryland, College Park, College Park, MD, USA
-
X. Cao, "User behavior analysis and data trading in multi-agent systems, " Ph. D. dissertation, Faculty Graduate School, Univ. Maryland, College Park, College Park, MD, USA, 2017.
-
(2017)
User Behavior Analysis and Data Trading in Multi-agent Systems
-
-
Cao, X.1
-
97
-
-
84997610330
-
User-initiated data plan trading via a personal hotspot market
-
Nov.
-
X. Wang, L. Duan, and R. Zhang, "User-initiated data plan trading via a personal hotspot market, " IEEE Trans. Wireless Commun., vol. 15, no. 11, pp. 7885-7898, Nov. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.11
, pp. 7885-7898
-
-
Wang, X.1
Duan, L.2
Zhang, R.3
-
98
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
Berlin, Germany: Springer
-
P. Paillier et al., "Public-key cryptosystems based on composite degree residuosity classes, " in Eurocrypt, vol. 99. Berlin, Germany: Springer, 1999, pp. 223-238.
-
(1999)
Eurocrypt
, vol.99
, pp. 223-238
-
-
Paillier, P.1
-
99
-
-
84884485247
-
Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
-
Berlin, Germany: Springer
-
C. Gentry, A. Sahai, and B. Waters, "Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based, " in Advances in Cryptology. CRYPTO. Berlin, Germany: Springer, 2013, pp. 75-92.
-
(2013)
Advances in Cryptology. CRYPTO
, pp. 75-92
-
-
Gentry, C.1
Sahai, A.2
Waters, B.3
-
100
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices, " in Proc. STOC, vol. 9. 2009, pp. 169-178.
-
(2009)
Proc. STOC
, vol.9
, pp. 169-178
-
-
Gentry, C.1
-
101
-
-
84862629748
-
On-the-fiy multiparty computation on the cloud via multikey fully homomorphic encryption
-
A. López-Alt, E. Tromer, and V. Vaikuntanathan, "On-the-fiy multiparty computation on the cloud via multikey fully homomorphic encryption, " in Proc. 44th Annu. ACM Symp. Theory Comput., 2012, pp. 1219-1234.
-
(2012)
Proc. 44th Annu. ACM Symp. Theory Comput.
, pp. 1219-1234
-
-
López-Alt, A.1
Tromer, E.2
Vaikuntanathan, V.3
-
102
-
-
85044964516
-
Privacy-preserving big data auction using homomorphic encryption
-
to be published
-
W. Gao, W. Yu, F. Liang, W. G. Hatcher, and C. Lu, "Privacy-preserving big data auction using homomorphic encryption, " in Proc. IEEE Int. Conf. Commun. (ICC), to be published.
-
Proc. IEEE Int. Conf. Commun. (ICC)
-
-
Gao, W.1
Yu, W.2
Liang, F.3
Hatcher, W.G.4
Lu, C.5
-
103
-
-
84942419053
-
End-to-end privacy for open big data markets
-
Apr.
-
C. Perera, R. Ranjan, and L. Wang, "End-to-end privacy for open big data markets, " IEEE Cloud Comput., vol. 2, no. 4, pp. 44-53, Apr. 2015.
-
(2015)
IEEE Cloud Comput.
, vol.2
, Issue.4
, pp. 44-53
-
-
Perera, C.1
Ranjan, R.2
Wang, L.3
-
104
-
-
85043711129
-
Survey on improving data utility in differentially private sequential data publishing
-
to be published
-
X. Yang, T. Wang, X. Ren, andW. Yu, "Survey on improving data utility in differentially private sequential data publishing, " IEEE Trans. Big Data, to be published.
-
IEEE Trans. Big Data
-
-
Yang, X.1
Wang, T.2
Ren, X.3
Yu, W.4
-
105
-
-
84987899075
-
On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems
-
Oct.
-
X. Yang, X. Ren, J. Lin, and W. Yu, "On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 10, pp. 2967-2983, Oct. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.10
, pp. 2967-2983
-
-
Yang, X.1
Ren, X.2
Lin, J.3
Yu, W.4
-
106
-
-
84886066391
-
-
K. U. Leuven, Belgium, Europe, Tech. Rep.
-
S. Gürses, C. Troncoso, and C. Diaz, "Engineering privacy by design, " K. U. Leuven, Belgium, Europe, Tech. Rep., 2011.
-
(2011)
Engineering Privacy by Design
-
-
Gürses, S.1
Troncoso, C.2
Diaz, C.3
-
107
-
-
0005063385
-
Onion routing
-
D. Goldschlag, M. Reed, and P. Syverson, "Onion routing, " Commun. ACM, vol. 42, no. 2, pp. 39-41, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
108
-
-
84944317249
-
LEO-DB2's learning optimizer
-
M. Stillger, G. M. Lohman, V. Markl, and M. Kandil, "LEO-DB2's learning optimizer, " in Proc. VLDB, vol. 1. 2001, pp. 19-28.
-
(2001)
Proc. VLDB
, vol.1
, pp. 19-28
-
-
Stillger, M.1
Lohman, G.M.2
Markl, V.3
Kandil, M.4
-
109
-
-
84976308250
-
Query optimization over cloud data market
-
Y. Li, E. Lo, M. L. Yiu, andW. Xu, "Query optimization over cloud data market, " in Proc. EDBT, 2015, pp. 229-240.
-
(2015)
Proc. EDBT
, pp. 229-240
-
-
Li, Y.1
Lo, E.2
Yiu, M.L.3
Xu, W.4
-
110
-
-
84904330224
-
Online optimization and fair costing for dynamic data sharing in a cloud data market
-
Z. Liu and H. Hacigümüs, "Online optimization and fair costing for dynamic data sharing in a cloud data market, " in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2014, pp. 1359-1370.
-
(2014)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 1359-1370
-
-
Liu, Z.1
Hacigümüs, H.2
-
111
-
-
84981318523
-
A matching game for data trading in operator-supervised user-provided networks
-
May
-
B. Lorenzo and F. J. Gonzalez-Castano, "A matching game for data trading in operator-supervised user-provided networks, " in Proc. IEEE Int. Conf. Commun. (ICC), May 2016, pp. 1-7.
-
(2016)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 1-7
-
-
Lorenzo, B.1
Gonzalez-Castano, F.J.2
-
112
-
-
85043717163
-
A strategyproof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids
-
Dec.
-
D. Li, Q. Yang, W. Yu, D. An, X. Yang, and W. Zhao, "A strategyproof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids, " in Proc. 36th IEEE Int. Perform. Comput. Commun. Conf. (IPCCC), Dec. 2017, pp. 1-8.
-
(2017)
Proc. 36th IEEE Int. Perform. Comput. Commun. Conf. (IPCCC)
, pp. 1-8
-
-
Li, D.1
Yang, Q.2
Yu, W.3
An, D.4
Yang, X.5
Zhao, W.6
-
113
-
-
38249011329
-
A dominant strategy double auction
-
Apr.
-
R. P. McAfee, "A dominant strategy double auction, " J. Econ. Theory, vol. 56, no. 2, pp. 434-450, Apr. 1992.
-
(1992)
J. Econ. Theory
, vol.56
, Issue.2
, pp. 434-450
-
-
McAfee, R.P.1
-
114
-
-
85032659210
-
Sto2auc: A stochastic optimal bidding strategy for microgrids
-
Dec.
-
D. An, Q. Yang, W. Yu, X. Yang, X. Fu, and W. Zhao, "Sto2auc: A stochastic optimal bidding strategy for microgrids, " IEEE Internet Things J., vol. 4, no. 6, pp. 2260-2274, Dec. 2017.
-
(2017)
IEEE Internet Things J.
, vol.4
, Issue.6
, pp. 2260-2274
-
-
An, D.1
Yang, Q.2
Yu, W.3
Yang, X.4
Fu, X.5
Zhao, W.6
-
115
-
-
84883139587
-
An iterative double auction for mobile data of floading
-
G. Iosidis, L. Gao, J. Huang, and L. Tassiulas, "An iterative double auction for mobile data of floading, " in Proc. Int. Symp. Modeling Optim. Mobile, Ad Hoc Wireless Netw., 2013, pp. 154-161.
-
(2013)
Proc. Int. Symp. Modeling Optim. Mobile, Ad Hoc Wireless Netw.
, pp. 154-161
-
-
Iosidis, G.1
Gao, L.2
Huang, J.3
Tassiulas, L.4
-
116
-
-
85039428797
-
SODA: Strategyproof online double auction scheme for multimicrogrids bidding
-
to be published
-
D. An, Q. Yang, W. Yu, X. Yang, X. Fu, andW. Zhao, "SODA: Strategyproof online double auction scheme for multimicrogrids bidding, " IEEE Trans. Syst., Man, Cybern., Syst., to be published.
-
IEEE Trans. Syst., Man, Cybern., Syst.
-
-
An, D.1
Yang, Q.2
Yu, W.3
Yang, X.4
Fu, X.5
Zhao, W.6
-
118
-
-
85044957821
-
Towards truthful auction for big data trading
-
Dec.
-
D. An, Q. Yang, W. Yu, D. Li, and Y. Zhang, "Towards truthful auction for big data trading, " in Proc. 36th IEEE Int. Perform. Comput. Commun. Conf. (IPCCC), Dec. 2017, pp. 1-7.
-
(2017)
Proc. 36th IEEE Int. Perform. Comput. Commun. Conf. (IPCCC)
, pp. 1-7
-
-
An, D.1
Yang, Q.2
Yu, W.3
Li, D.4
Zhang, Y.5
-
119
-
-
85044923603
-
VCG auction-based dynamic pricing for multigranularity service composition
-
to be published
-
Q. Wu, M. C. Zhou, Q. Zhu, and Y. Xia, "VCG auction-based dynamic pricing for multigranularity service composition, " IEEE Trans. Autom. Sci. Eng., to be published.
-
IEEE Trans. Autom. Sci. Eng.
-
-
Wu, Q.1
Zhou, M.C.2
Zhu, Q.3
Xia, Y.4
-
121
-
-
85075541899
-
Buying on margin and short selling in an Artificial double auction market
-
Aug.
-
X. Zhou and H. Li, "Buying on margin and short selling in an Artificial double auction market, " Comput. Econ., vol. 8, pp. 1-17, Aug. 2017.
-
(2017)
Comput. Econ.
, vol.8
, pp. 1-17
-
-
Zhou, X.1
Li, H.2
-
122
-
-
85015247294
-
TPAHS: A truthful and profit maximizing double auction for heterogeneous spectrums
-
Aug.
-
T. Zhou, B. Chen, C. Zhu, and X. Zhai, "TPAHS: A truthful and profit maximizing double auction for heterogeneous spectrums, " in Proc. Trustcom/BigDatase/ISPA, Aug. 2017, pp. 27-33.
-
(2017)
Proc. Trustcom/BigDatase/ISPA
, pp. 27-33
-
-
Zhou, T.1
Chen, B.2
Zhu, C.3
Zhai, X.4
-
123
-
-
85044949330
-
Towards double auction for assisting electric vehicles demand response in smart grid
-
Aug.
-
D. Li, Q. Yang, W. Yu, D. An, and X. Yang, "Towards double auction for assisting electric vehicles demand response in smart grid, " in Proc. 13th IEEE Conf. Autom. Sci. Eng. (CASE), Aug. 2017, pp. 1604-1609.
-
(2017)
Proc. 13th IEEE Conf. Autom. Sci. Eng. (CASE)
, pp. 1604-1609
-
-
Li, D.1
Yang, Q.2
Yu, W.3
An, D.4
Yang, X.5
-
124
-
-
85027245531
-
Effective mobile data trading in secondary ad-hoc market with heterogeneous and dynamic environment
-
H. Susanto, H. Zhang, S. Ho, and B. Liu, "Effective mobile data trading in secondary ad-hoc market with heterogeneous and dynamic environment, " in Proc. ICDCS, 2017, pp. 645-655.
-
(2017)
Proc. ICDCS
, pp. 645-655
-
-
Susanto, H.1
Zhang, H.2
Ho, S.3
Liu, B.4
-
125
-
-
61649120592
-
Outside options: Another reason to choose the first-price auction
-
O. Kirchkamp, E. Poen, and J. P. Reiÿ, "Outside options: Another reason to choose the first-price auction, " Eur. Econ. Rev., vol. 53, no. 2, pp. 153-169, 2009.
-
(2009)
Eur. Econ. Rev.
, vol.53
, Issue.2
, pp. 153-169
-
-
Kirchkamp, O.1
Poen, E.2
Reiÿ, J.P.3
-
126
-
-
34247216451
-
Internet advertising and the generalized second price auction: Selling billions of dollars worth of keywords
-
Nashville, TN, USA, Tech. Rep.
-
B. Edelman and M. Schwarz, "Internet advertising and the generalized second price auction: Selling billions of dollars worth of keywords, " Amer. Econ. Assoc., Nashville, TN, USA, Tech. Rep., 2007.
-
(2007)
Amer. Econ. Assoc.
-
-
Edelman, B.1
Schwarz, M.2
-
127
-
-
0002966454
-
Computationally feasible VCG mechanisms
-
N. Nisan and A. Ronen, "Computationally feasible VCG mechanisms, " J. Artif. Intell. Res., vol. 29, no. 6, pp. 242-252, 2000.
-
(2000)
J. Artif. Intell. Res.
, vol.29
, Issue.6
, pp. 242-252
-
-
Nisan, N.1
Ronen, A.2
-
129
-
-
0242550401
-
Combinatorial auctions: A survey
-
S. D. Vries and R. Vohra, "Combinatorial auctions: A survey, " Discussion Papers, vol. 15, no. 3, pp. 284-309, 2000.
-
(2000)
Discussion Papers
, vol.15
, Issue.3
, pp. 284-309
-
-
Vries, S.D.1
Vohra, R.2
-
130
-
-
23044503942
-
-
Cambridge, MA, USA: MIT Press
-
P. Cramton, Y. Shoham, and R. Steinberg, Combinatorial Auctions. Cambridge, MA, USA: MIT Press, 2006.
-
(2006)
Combinatorial Auctions.
-
-
Cramton, P.1
Shoham, Y.2
Steinberg, R.3
-
131
-
-
84930532115
-
A general privacy-preserving auction mechanism for secondary spectrum markets
-
Jun.
-
Q. Huang, Y. Gui, F. Wu, Q. Zhang, and G. Chen, "A general privacy-preserving auction mechanism for secondary spectrum markets, " IEEE/ACM Trans. Netw., vol. 24, no. 3, pp. 1881-1893, Jun. 2016.
-
(2016)
IEEE/ACM Trans. Netw.
, vol.24
, Issue.3
, pp. 1881-1893
-
-
Huang, Q.1
Gui, Y.2
Wu, F.3
Zhang, Q.4
Chen, G.5
-
133
-
-
84954521927
-
Differentially private and strategy-proof spectrum auction with approximate revenue maximization
-
May
-
R. Zhu and K. G. Shin, "Differentially private and strategy-proof spectrum auction with approximate revenue maximization, " in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), May 2015, pp. 918-926.
-
(2015)
Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM)
, pp. 918-926
-
-
Zhu, R.1
Shin, K.G.2
-
134
-
-
85044952029
-
-
Piscataway, NJ, USA: IEEE Press
-
Y. Zhang, Y. Mao, and S. Zhong, Joint Differentially Private GaleCShapley Mechanisms for Location Privacy Protection in Mobile Traffic Of floading Systems. Piscataway, NJ, USA: IEEE Press, 2016.
-
(2016)
Joint Differentially Private GaleCShapley Mechanisms for Location Privacy Protection in Mobile Traffic of Floading Systems
-
-
Zhang, Y.1
Mao, Y.2
Zhong, S.3
-
135
-
-
84985996204
-
Enabling privacypreserving incentives for mobile crowd sensing systems
-
Jun.
-
H. Jin, L. Su, B. Ding, K. Nahrstedt, and N. Borisov, "Enabling privacypreserving incentives for mobile crowd sensing systems, " in Proc. IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2016, pp. 344-353.
-
(2016)
Proc. IEEE Int. Conf. Distrib. Comput. Syst.
, pp. 344-353
-
-
Jin, H.1
Su, L.2
Ding, B.3
Nahrstedt, K.4
Borisov, N.5
-
137
-
-
84994482742
-
Auc2Reserve: A differentially private auction for electric vehicle fast charging reservation (invited paper)
-
Aug.
-
Q. Xiang, L. Kong, X. Liu, J. Xu, and W. Wang, "Auc2Reserve: A differentially private auction for electric vehicle fast charging reservation (invited paper), " in Proc. IEEE Int. Conf. Embedded Real-Time Comput. Syst. Appl., Aug. 2016, pp. 85-94.
-
(2016)
Proc. IEEE Int. Conf. Embedded Real-Time Comput. Syst. Appl.
, pp. 85-94
-
-
Xiang, Q.1
Kong, L.2
Liu, X.3
Xu, J.4
Wang, W.5
-
138
-
-
84946690415
-
Sealed-BID electronic auction without the third party
-
S. Li, X. Li, M. X. He, and S. K. Zeng, "Sealed-BID electronic auction without the third party, " in Proc. Int. Comput. Conf. Wavelet Active Media Technol. Inf. Process., 2014, pp. 336-339.
-
(2014)
Proc. Int. Comput. Conf. Wavelet Active Media Technol. Inf. Process.
, pp. 336-339
-
-
Li, S.1
Li, X.2
He, M.X.3
Zeng, S.K.4
-
139
-
-
34548755641
-
DSSS-based flow marking technique for invisible traceback
-
May
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, "DSSS-based flow marking technique for invisible traceback, " in Proc. IEEE Symp. Security Privacy (SP), May 2007, pp. 18-32.
-
(2007)
Proc. IEEE Symp. Security Privacy (SP)
, pp. 18-32
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
140
-
-
70350244874
-
CAP: A contextaware privacy protection system for location-based services
-
Jun.
-
A. Pingley, W. Yu, N. Zhang, X. Fu, and W. Zhao, "CAP: A contextaware privacy protection system for location-based services, " in Proc. 29th IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2009, pp. 49-57.
-
(2009)
Proc. 29th IEEE Int. Conf. Distrib. Comput. Syst.
, pp. 49-57
-
-
Pingley, A.1
Yu, W.2
Zhang, N.3
Fu, X.4
Zhao, W.5
-
141
-
-
84899651713
-
Efficient fully homomorphic encryption from (standard) LWE
-
Z. Brakerski and V. Vaikuntanathan, "efficient fully homomorphic encryption from (standard) LWE, " SIAM J. Comput., vol. 43, no. 2, pp. 831-871, 2014.
-
(2014)
SIAM J. Comput.
, vol.43
, Issue.2
, pp. 831-871
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
142
-
-
85032690287
-
Homomorphic secret sharing from paillier encryption
-
N. Fazio, R. Gennaro, T. Jafarikhah, and W. E. Skeith, "Homomorphic secret sharing from paillier encryption, " in Proc. Int. Conf. Provable Security, 2017, pp. 381-399.
-
(2017)
Proc. Int. Conf. Provable Security
, pp. 381-399
-
-
Fazio, N.1
Gennaro, R.2
Jafarikhah, T.3
Skeith, W.E.4
-
144
-
-
85060752004
-
-
Univ. Borås, Borås, Sweden, Tech. Rep.
-
A. Hohmann, "Rights expression languages in libraries: Development of an application profile, " Univ. Borås, Borås, Sweden, Tech. Rep., 2016.
-
(2016)
Rights Expression Languages in Libraries: Development of An Application Profile
-
-
Hohmann, A.1
-
146
-
-
84949096402
-
An adversary model to evaluate DRM protection of video contents on iOS devices
-
Feb.
-
C. D'Orazio and K.-K. R. Choo, "An adversary model to evaluate DRM protection of video contents on iOS devices, " Comput. Security, vol. 56, pp. 94-110, Feb. 2016.
-
(2016)
Comput. Security
, vol.56
, pp. 94-110
-
-
D'Orazio, C.1
Choo, K.-K.R.2
-
148
-
-
84893700942
-
Digital rights management: Open issues to support E-commerce
-
Hershey, PA, USA: IGI Global
-
T. Gaber, "Digital rights management: Open issues to support E-commerce, " in E-Marketing in Developed and Developing Countries. Hershey, PA, USA: IGI Global, 2013, pp. 69-87.
-
(2013)
E-Marketing in Developed and Developing Countries
, pp. 69-87
-
-
Gaber, T.1
-
149
-
-
84965076190
-
Bypassing the integrity checking of rights objects in OMA DRM: A case study with the MelOn music service
-
J. Choi, W. Aiken, J. Ryoo, and H. Kim, "Bypassing the integrity checking of rights objects in OMA DRM: A case study with the MelOn music service, " in Proc. 10th Int. Conf. Ubiquitous Inf. Manage. Commun., 2016, p. 62.
-
(2016)
Proc. 10th Int. Conf. Ubiquitous Inf. Manage. Commun
, pp. 62
-
-
Choi, J.1
Aiken, W.2
Ryoo, J.3
Kim, H.4
-
151
-
-
85044971986
-
-
Microsoft. (2016). Digital Rights Management (DRM). [Online]. Available: https://msdn. microsoft. com/es-es/library/cc838192(v=vs. 95). aspx
-
(2016)
Digital Rights Management (DRM)
-
-
-
152
-
-
0001020817
-
Software piracy: An analysis of protection strategies
-
K. Reavis Conner and R. P. Rumelt, "Software piracy: An analysis of protection strategies, " Manage. Sci., vol. 37, no. 2, pp. 125-139, 1991.
-
(1991)
Manage. Sci.
, vol.37
, Issue.2
, pp. 125-139
-
-
Reavis Conner, K.1
Rumelt, R.P.2
-
153
-
-
85044943763
-
Software piracy protection
-
H. Barapatre, P. Nimje, and A. Nimbalkar, "Software piracy protection, " Imperial J. Interdiscipl. Res., vol. 3, no. 4, p. 1, 2017.
-
(2017)
Imperial J. Interdiscipl. Res.
, vol.3
, Issue.4
, pp. 1
-
-
Barapatre, H.1
Nimje, P.2
Nimbalkar, A.3
-
156
-
-
0004893214
-
Mpeg video encryption in realtime using secret key cryptography
-
C. Shi, S.-Y. Wang, and B. Bhargava, "Mpeg video encryption in realtime using secret key cryptography, " in Proc. Int. Conf. Parallel Distrib. Process. Techn. Appl., 1999, p. 29.
-
(1999)
Proc. Int. Conf. Parallel Distrib. Process. Techn. Appl.
, pp. 29
-
-
Shi, C.1
Wang, S.-Y.2
Bhargava, B.3
-
157
-
-
84937060970
-
A robust video watermarking technique for the tamper detection of surveillance systems
-
F. Arab, S. M. Abdullah, S. Z. M. Hashim, A. A. Manaf, and M. Zamani, "A robust video watermarking technique for the tamper detection of surveillance systems, " Multimedia Tools Appl., vol. 75, no. 18, p. 10855, 2016.
-
(2016)
Multimedia Tools Appl.
, vol.75
, Issue.18
, pp. 10855
-
-
Arab, F.1
Abdullah, S.M.2
Hashim, S.Z.M.3
Manaf, A.A.4
Zamani, M.5
-
158
-
-
85044948412
-
-
U. S. Patent
-
J. Hao, X. Yao, J. Huang, Y. Qian, and J. Jagannathan, "Video content protection, " U. S. Patent 9/, 258 584 Feb. 9, 2016.
-
(2016)
Video Content Protection
-
-
Hao, J.1
Yao, X.2
Huang, J.3
Qian, Y.4
Jagannathan, J.5
-
159
-
-
85044975051
-
-
NIT Warangal, Hanamkonda, India, Tech. Rep.
-
K. Jain and U. Raju, "A digital video watermarking algorithm based on LSB and DCT, " NIT Warangal, Hanamkonda, India, Tech. Rep., 2015.
-
(2015)
A Digital Video Watermarking Algorithm Based on LSB and DCT
-
-
Jain, K.1
Raju, U.2
-
160
-
-
85052793679
-
A new robust video watermarking technique using H. 264/AAC Codec luma components based on DCT
-
N. Azeem, I. Ahmad, S. R. Jan, M. Tahir, F. Ullah, and F. Khan, "A new robust video watermarking technique using H. 264/AAC Codec luma components based on DCT, " Int. J. Adv. Res. Innov. Ideas Edu., vol. 2, no. 3, pp. 1-11, 2016.
-
(2016)
Int. J. Adv. Res. Innov. Ideas Edu.
, vol.2
, Issue.3
, pp. 1-11
-
-
Azeem, N.1
Ahmad, I.2
Jan, S.R.3
Tahir, M.4
Ullah, F.5
Khan, F.6
-
161
-
-
84893345193
-
Adaptive watermarking and tree structure based image quality estimation
-
Feb.
-
S. Wang, D. Zheng, J. Zhao, W. J. Tam, and F. Speranza, "Adaptive watermarking and tree structure based image quality estimation, " IEEE Trans. Multimedia, vol. 16, no. 2, pp. 311-325, Feb. 2014.
-
(2014)
IEEE Trans. Multimedia
, vol.16
, Issue.2
, pp. 311-325
-
-
Wang, S.1
Zheng, D.2
Zhao, J.3
Tam, W.J.4
Speranza, F.5
-
162
-
-
85006421132
-
A video watermarking DRM method based on H. 264 compressed domain with low bit-rate increasement
-
Z. Ma, J. Huang, M. Jiang, and X. Niu, "A video watermarking DRM method based on H. 264 compressed domain with low bit-rate increasement, " Chin. J. Electron., vol. 25, no. 4, pp. 641-647, 2016.
-
(2016)
Chin. J. Electron.
, vol.25
, Issue.4
, pp. 641-647
-
-
Ma, Z.1
Huang, J.2
Jiang, M.3
Niu, X.4
-
163
-
-
84997482069
-
A robust and synthesized-unseen watermarking for the DRM of DIBR-based 3D video
-
X. Liu, F. Li, J. Du, Y. Guan, Y. Zhu, and B. Zou, "A robust and synthesized-unseen watermarking for the DRM of DIBR-based 3D video, " Neurocomputing, vol. 222, no. 3, pp. 155-169, 2017.
-
(2017)
Neurocomputing
, vol.222
, Issue.3
, pp. 155-169
-
-
Liu, X.1
Li, F.2
Du, J.3
Guan, Y.4
Zhu, Y.5
Zou, B.6
-
164
-
-
84887958680
-
Novel Packet Size-Based Covert Channel Attacks against Anonymizer
-
Dec.
-
Z. Ling, X. Fu, W. Jia, W. Yu, D. Xuan, and J. Luo, "Novel Packet Size-Based Covert Channel Attacks against Anonymizer, " IEEE Trans. Comput., vol. 62, no. 12, pp. 2411-2426, Dec. 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.12
, pp. 2411-2426
-
-
Ling, Z.1
Fu, X.2
Jia, W.3
Yu, W.4
Xuan, D.5
Luo, J.6
-
165
-
-
84865344045
-
A new cellcounting-based attack against Tor
-
Aug.
-
Z. Ling, J. Luo, W. Yu, X. Fu, D. Xuan, and W. Jia, "A new cellcounting-based attack against Tor, " IEEE/ACM Trans. Netw., vol. 20, no. 4, pp. 1245-1261, Aug. 2012.
-
(2012)
IEEE/ACM Trans. Netw.
, vol.20
, Issue.4
, pp. 1245-1261
-
-
Ling, Z.1
Luo, J.2
Yu, W.3
Fu, X.4
Xuan, D.5
Jia, W.6
-
167
-
-
84947790480
-
Applicability of probablistic data structures for filtering tasks in data loss prevention systems
-
Mar.
-
L. Shi, S. Butakov, D. Lindskog, R. Ruhl, and E. Storozhenko, "Applicability of probablistic data structures for filtering tasks in data loss prevention systems, " in Proc. IEEE 29th Int. Conf. Adv. Inf. Netw. Appl. Workshops (WAINA), Mar. 2015, pp. 582-586.
-
(2015)
Proc. IEEE 29th Int. Conf. Adv. Inf. Netw. Appl. Workshops (WAINA)
, pp. 582-586
-
-
Shi, L.1
Butakov, S.2
Lindskog, D.3
Ruhl, R.4
Storozhenko, E.5
|