Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-sjtt6 Total loading time: 0 Render date: 2024-06-29T19:30:14.259Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  15 May 2020

Dusit Niyato
Affiliation:
Nanyang Technological University, Singapore
Nguyen Cong Luong
Affiliation:
Phenikaa University, Vietnam
Ping Wang
Affiliation:
York University, Toronto
Zhu Han
Affiliation:
University of Houston
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] Krishna, V., Auction Theory. San Diego, CA: Academic Press, 2002.Google Scholar
[2] Shubik, M., The Theory of Money and Financial Institutions: Volume 1. Cambridge, MA: MIT Press, 2004.Google Scholar
[3] Hekster, O., Rome and Its Empire, AD 193–284. Edinburgh: Edinburgh University Press, 2008.Google Scholar
[4] About auctions. Federal Communications Commission [Online]. (Dec. 2017). Available: www.fcc.gov/auctions/about-auctionsGoogle Scholar
[5] Binmore, K. and Klemperer, P., “The biggest auction ever: The sale of the British 3G telecom licences,” Economic Journal, vol. 112, no. 478, pp. 7496, Apr. 2002.CrossRefGoogle Scholar
[6] Results of auction. Ofcom [Online]. (Apr. 2018). Available: www.ofcom.org.ukGoogle Scholar
[7] The advantages of eBay for online sellers [Online]. (Jan. 2019). Available: www.channelreply.com/blog/view/advantages-of-ebayGoogle Scholar
[8] Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M., “Internet of Things (IoT): A vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 16451660, Sept. 2013.Google Scholar
[9] Brock, L., A naming scheme for physical objects [Online]. (2001). Available: http://cocoa.ethz.ch/downloads/2014/06/None-MIT-AUTOID-WH-002.pdfGoogle Scholar
[10] Roberto, M., Abyi, B., and Domenico, R., “Towards a definition of the Internet of Things (IoT),” Technical Report, 2015.Google Scholar
[11] Atzori, L., Iera, A., and Morabito, G., “The Internet of Things: A survey,” Computer Networks, vol. 54, no. 15, pp. 27872805, Oct. 2010.CrossRefGoogle Scholar
[12] Ibid.Google Scholar
[13] Zhou, L., Chong, A., and Ngai, E., “Supply chain management in the era of the Internet of Things,” International Journal of Production Economics, vol. 159, no. 1, pp. 13, Oct. 2015.CrossRefGoogle Scholar
[14] Sarkar, C., Nambi, S. N. A. U., Prasad, R. V., and Rahim, A., “A scalable distributed architecture towards unifying IoT applications,” in 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, Mar. 2014, pp. 508513.Google Scholar
[15] Borgia, E., “The Internet of Things vision: Key features, applications and open issues,” Computer Communications, vol. 54, pp. 131, Dec. 2014.CrossRefGoogle Scholar
[16] Luong, N. C., Hoang, D. T., Wang, P., Niyato, D., Kim, D. I., and Han, Z., “Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey,” IEEE Communications Surveys & Tutorials, vol. 18, no. 4, pp. 25462590, 2016.Google Scholar
[17] Uckelmann, D., Harrison, M., and Michahelles, F., “An architectural approach towards the future Internet of Things,” in Architecting the Internet of Things. Berlin/Heidelberg: Springer, 2011, pp. 124.CrossRefGoogle Scholar
[18] Gluhak, A., Krco, S., Nati, M., Pfisterer, D., Mitton, N., and Razafindralambo, T., “A survey on facilities for experimental Internet of Things research,” IEEE Communications Magazine, vol. 49, no. 11, pp. 5867, Nov. 2011.Google Scholar
[19] Nesse, P. J., Svaet, S., Strasunskas, D., and Gaivoronski, A. A., “Assessment and optimisation of business opportunities for telecom operators in the cloud value network,” Transactions on Emerging Telecommunications Technologies, vol. 24, no. 5, pp. 503516, June 2013.Google Scholar
[20] Sarvary, M. and Parker, P. M., “Marketing information: A competitive analysis,” Marketing Science, vol. 16, no. 1, pp. 2438, Feb. 1997.Google Scholar
[21] Feng, Y., Li, B., and Li, B., “Price competition in an oligopoly market with multiple iaas cloud providers,” IEEE Transactions on Computers, vol. 63, no. 1, pp. 5973, Jan. 2014.Google Scholar
[22] Niyato, D., Lu, X., Wang, P., Kim, D. I., and Han, Z., “Economics of Internet of Things (IoT): An information market approach,” IEEE Wireless Communications, vol. 23, no. 4, pp. 136145, Aug. 2016.Google Scholar
[23] Bin, S., Yuan, L., and Xiaoyi, W., “Research on data mining models for the Internet of Things,” in IEEE International Conference on Image Analysis and Signal Processing (IASP), Zhejiang, China, Apr. 2010, pp. 127132.Google Scholar
[24] Chen, Z., Xia, F., Huang, T., Bu, F., and Wang, H., “A localization method for the Internet of Things,” The Journal of Supercomputing, vol. 63, no. 3, pp. 657674, Mar. 2013.Google Scholar
[25] Location-based service revenues will grow to 34.8 billion euros in 2020. IoT Business News [Online]. (2015). Available: https://iotbusinessnews.com/2015/08/31/79312-location-based-service-revenues-will-grow-to-34-8-billion-euros-in-2020/Google Scholar
[26] Honicky, R., Brewer, E. A., Paulos, E., and White, R., “N-smarts: Networked suite of mobile atmospheric real-time sensors,” in Proceedings of the Second ACM SIGCOMM Workshop on Networked Systems for Developing Regions, Seattle, WA, Aug. 2008, pp. 2530.CrossRefGoogle Scholar
[27] Ennis, M. and Rowe, R. K., “Hygienic biometric sensors,” July 2012, U.S. Patent 8,229,185.Google Scholar
[28] Gao, H., Liu, C. H., Wang, W., Zhao, J., Song, Z., Su, X., Crowcroft, J., and Leung, K. K., “A survey of incentive mechanisms for participatory sensing,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 918943, 2015.Google Scholar
[29] Jaimes, L. G., Vergara-Laurens, I. J., and Raij, A., “A survey of incentive techniques for mobile crowd sensing,” IEEE Journal Internet of Things, vol. 2, no. 5, pp. 370380, Oct. 2015.Google Scholar
[30] Zhang, X., Yang, Z., Sun, W., Liu, Y., Tang, S., Xing, K., and Mao, X., “Incentives for mobile crowd sensing: A survey,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 5467, 2016.Google Scholar
[31] Ganti, R. K., Ye, F., and Lei, H., “Mobile crowdsensing: Current state and future challenges,” IEEE Communications Magazine, vol. 49, no. 11, pp. 3239, Nov. 2011.Google Scholar
[32] Liu, J., Shen, H., Narman, H. S., Chung, W., and Lin, Z., “A survey of mobile crowdsensing techniques: A critical component for the Internet of Things,” ACM Transactions on Cyber-Physical Systems, vol. 2, no. 3, pp. 18:1–18:26, July 2018.Google Scholar
[33] Luong, N. C., Hoang, D. T., Wang, P., Niyato, D., and Han, Z., “Applications of economic and pricing models for wireless network security: A survey,” IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 27352767, 2017.Google Scholar
[34] Sultan, N., “Cloud computing for education: A new dawn?International Journal of Information Management, vol. 30, no. 2, pp. 109116, Apr. 2010.Google Scholar
[35] Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., and Venkatasubramanian, N., “Mobile cloud computing: A survey, state of art and future directions,” Mobile Networks and Applications, vol. 19, no. 2, pp. 133143, Apr. 2014.CrossRefGoogle Scholar
[36] Kuo, M.-H., “Opportunities and challenges of cloud computing to improve health care services,” Journal of Medical Internet Research, vol. 13, no. 3, pp. 6789, Sept. 2011.Google Scholar
[37] Li, Z., Chen, C., and Wang, K., “Cloud computing for agent-based urban transportation systems,” IEEE Intelligent Systems, vol. 26, no. 1, pp. 7379, Feb. 2011.Google Scholar
[38] Chard, K., Caton, S., Rana, O. F., and Bubendorfer, K., “Social cloud: Cloud computing in social networks,” in International Conference on Cloud Computing, Miami, FL, July 2010, pp. 99106.Google Scholar
[39] Lawton, G., “Developing software online with platform-as-a-service technology,” Computer, vol. 41, no. 6, pp. 1315, June 2008.Google Scholar
[40] Bhardwaj, S., Jain, L., and Jain, S., “Cloud computing: A study of infrastructure as a service (IaaS),” International Journal of Engineering and Information Technology, vol. 2, no. 1, pp. 6063, 2010.Google Scholar
[41] Benlian, A. and Hess, T., “Opportunities and risks of software-as-a-service: Findings from a survey of IT Executives,” Decision Support Systems, vol. 52, no. 1, pp. 232246, Dec. 2011.CrossRefGoogle Scholar
[42] Luong, N. C., Wang, P., Niyato, D., Wen, Y., and Han, Z., “Resource management in cloud networking using economic analysis and pricing models: A survey,” IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 9541001, 2017.Google Scholar
[43] Duan, Q., Yan, Y., and Vasilakos, A. V., “A survey on service-oriented network virtualization toward convergence of networking and cloud computing,” IEEE Transactions on Network and Service Management, vol. 9, no. 4, pp. 373392, Dec. 2012.Google Scholar
[44] Murray, P., Sefidcon, A., Steinert, R., Fusenig, V., and Carapinha, J., “Cloud networking: An infrastructure service architecture for the wide area,” in Future Network & Mobile Summit (FutureNetw), Berlin, Germany, July 2012.Google Scholar
[45] Xiang, X., Lin, C., Chen, F., and Chen, X., “Greening geo-distributed data centers by joint optimization of request routing and virtual machine scheduling,” in Proceedings of the IEEE/ACM 7th International Conference on Utility and Cloud Computing, London, UK, Dec. 2014.Google Scholar
[46] Bitar, N., Gringeri, S., and Xia, T. J., “Technologies and protocols for data center and cloud networking,” IEEE Communications Magazine, vol. 51, no. 9, pp. 2431, Sept. 2013.CrossRefGoogle Scholar
[47] Levin, A. and Massonet, P., “Enabling federated cloud networking,” in Proceedings of the 8th ACM International Systems and Storage Conference. Haifa, Israel: ACM, May 2015, pp. 2323.Google Scholar
[48] Jamakovic, A., Bohnert, T. M., and Karagiannis, G., Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand. Berlin/Heidelberg: Springer, 2013.Google Scholar
[49] Karagiannis, G., Jamakovic, A., Edmonds, A., Parada, C., Metsch, T., Pichon, D., Corici, M., Ruffino, S., Gomes, A., Crosta, P. S., et al., “Mobile cloud networking: Virtualisation of cellular networks,” in 21st International Conference on Telecommunications (ICT), Lisbon, Portugal, May 2014, pp. 410415.Google Scholar
[50] Lewis, G., Echeverría, S., Simanta, S., Bradshaw, B., and Root, J., “Tactical cloudlets: Moving cloud computing to the edge,” in IEEE Military Communications Conference, Baltimore, MD, Oct. 2014, pp. 14401446.Google Scholar
[51] Stojmenovic, I. and Wen, S., “The fog computing paradigm: Scenarios and security issues,” in Federated Conference on Computer Science and Information Systems (FedCSIS), Warsaw, Poland, Sept. 2014.Google Scholar
[52] Ahlgren, B., Aranda, P. A., Chemouil, P., Oueslati, S., Correia, L. M., Karl, H., Söllner, M., and Welin, A., “Content, connectivity, and cloud: Ingredients for the network of the future,” IEEE Communications Magazine, vol. 49, no. 7, pp. 6270, June 2011.CrossRefGoogle Scholar
[53] Beck, M. T., Werner, M., Feld, S., and Schimper, S., “Mobile edge computing: A taxonomy,” in Proceedings of the Sixth International Conference on Advances in Future Internet, Lisbon, Portugal, Nov. 2014, pp. 17.Google Scholar
[54] Smith, J. E. and Nair, R., “The architecture of virtual machines,” Computer, vol. 38, no. 5, pp. 3238, May 2005.Google Scholar
[55] Yuan, Y., Wang, C.-r., and Wang, C., “A game based approach for sharing the data center network,” in International Symposium on Neural Networks, Shenyang, China, July 2012, pp. 641649.Google Scholar
[56] Carella, G., Edmonds, A., Dudouet, F., Corici, M., Sousa, B., and Yousaf, Z., “Mobile cloud networking: From cloud, through NFV and beyond,” in IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), San Francisco, CA, Nov. 2015, pp. 78.Google Scholar
[57] Rost, P., Bernardos, C. J., De Domenico, A., Di Girolamo, M., Lalam, M., Maeder, A., Sabella, D., and Wübben, D., “Cloud technologies for flexible 5G radio access networks,” IEEE Communications Magazine, vol. 52, no. 5, pp. 6876, Sept. 2014.Google Scholar
[58] Peng, M., Wang, C., Lau, V., and Poor, H. V., “Fronthaul-constrained cloud radio access networks: Insights and challenges,” IEEE Wireless Communications, vol. 22, no. 2, pp. 152160, Apr. 2015.Google Scholar
[59] Checko, A., Christiansen, H. L., Yan, Y., Scolari, L., Kardaras, G., Berger, M. S., and Dittmann, L., “Cloud ran for mobile networks: A technology overview,” IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 405426, 2015.Google Scholar
[60] Greenberg, A., Hamilton, J., Maltz, D. A., and Patel, P., “The cost of a cloud: Research problems in data center networks,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 6873, Jan. 2008.CrossRefGoogle Scholar
[61] Garcia Lopez, P., Montresor, A., Epema, D., Datta, A., Higashino, T., Iamnitchi, A., Barcellos, M., Felber, P., and Riviere, E., “Edge-centric computing: Vision and challenges,” ACM SIGCOMM Computer Communication Review, vol. 45, no. 5, pp. 3742, Oct. 2015.Google Scholar
[62] Ahmed, A. and Ahmed, E., “A survey on mobile edge computing,” in Proceedings of the 10th IEEE International Conference on Intelligent Systems and Control (ISCO 2016), Coimbatore, India, Jan. 2016, pp. 18.Google Scholar
[63] Shi, W., Cao, J., Zhang, Q., Li, Y., and Xu, L., “Edge computing: Vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637646, Oct. 2016.Google Scholar
[64] Mach, P. and Becvar, Z., “Mobile edge computing: A survey on architecture and computation offloading,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 16281656, 2017.Google Scholar
[65] Mao, Y., You, C., Zhang, J., Huang, K., and Letaief, K. B., “A survey on mobile edge computing: The communication perspective,” IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 23222358, 2017.Google Scholar
[66] Newslog, I.. IPTV standardization on track say industry experts [Online]. (2006). Available: www.itu.int/ITU-T/newslog/IPTV+Standardization+On+Track+Say+Industry+Experts .aspxGoogle Scholar
[67] Hua, K. A., Cai, Y., and Sheu, S., “Patching: A multicast technique for true video-on-demand services,” in Proceedings of the Sixth ACM International Conference on Multimedia. Bristol, UK: ACM, Sept. 1998, pp. 191200.Google Scholar
[68] Murray, P.. Cloud networking architecture description [Online]. (2012). Available: www.sail-project.eu/wp-content/uploads/2011/09/SAILDD1 finalpublic.pdfGoogle Scholar
[69] Liu, Z., Wang, Q., Huang, J., Wu, Y., Wang, Y., Jia, X., and Chen, H., “Cloud-based video-on-demand services for smart TV,” in International Conference on Information Science and Technology (ICIST), Da Nang, Vietnam, Apr. 2017, pp. 8184.Google Scholar
[70] Wu, Y., Wu, C., Li, B., Qiu, X., and Lau, F., “Cloudmedia: When cloud on demand meets video on demand,” in International Conference on Distributed Computing Systems (ICDCS), Minneapolis, MN, June 2011, pp. 268277.Google Scholar
[71] Agiwal, M., Roy, A., and Saxena, N., “Next generation 5G wireless networks: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 16171655, 2016.Google Scholar
[72] IMT vision framework and overall objectives of the future development of IMT for 2020 and beyond. ITU [Online]. Available: www.itu.int/Google Scholar
[73] Hossain, E. and Hasan, M., “5G cellular: Key enabling technologies and research challenges,” IEEE Instrumentation & Measurement Magazine, vol. 18, no. 3, pp. 1121, May 2015.Google Scholar
[74] Luong, N. C., Wang, P., Niyato, D., Liang, Y.-C., Han, Z., and Hou, F., “Applications of economic and pricing models for resource management in 5G wireless networks: A survey,” IEEE Communications Surveys & Tutorials, vol: 21, no: 4, pp. 32983339, 2018.Google Scholar
[75] Larsson, E. G., Edfors, O., Tufvesson, F., and Marzetta, T. L., “Massive MIMO for next generation wireless systems,” IEEE Communications Magazine, vol. 52, no. 2, pp. 186195, Feb. 2014.Google Scholar
[76] Di Renzo, M., Haas, H., Ghrayeb, A., Sugiura, S., and Hanzo, L., “Spatial modulation for generalized MIMO: Challenges, opportunities, and implementation,” Proceedings of the IEEE, vol. 102, no. 1, pp. 56103, Jan. 2014.Google Scholar
[77] Cramton, P. C., Shoham, Y., Steinberg, R., et al., Combinatorial Auctions. Cambridge, MA: MIT Press, 2006.Google Scholar
[78] Sawahashi, M., Kishiyama, Y., Morimoto, A., Nishikawa, D., and Tanno, M., “Coordinated multipoint transmission/reception techniques for LTE-advanced [coordinated and distributed MIMO],” IEEE Wireless Communications, vol. 17, no. 3, pp. 2634, June 2010.Google Scholar
[79] Kamel, M., Hamouda, W., and Youssef, A., “Ultra-dense networks: A survey,” IEEE Communications Surveys & Tutorials, vol. 18, no. 4, pp. 25222545, May 2016.Google Scholar
[80] Sediq, A. B., Gohary, R. H., Schoenen, R., and Yanikomeroglu, H., “Optimal tradeoff between sum-rate efficiency and Jain’s fairness index in resource allocation,” IEEE Transactions on Wireless Communications, vol. 12, no. 7, pp. 34963509, June 2013.Google Scholar
[81] IEEE 802.11ad. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications – amendment 3: Enhancements for very high throughput in the 60 GHz band , Standard, Dec. 2012.Google Scholar
[82] Elkashlan, M., Duong, T. Q., and Chen, H.-H., “Millimeter-wave communications for 5G: Fundamentals: Part I [Guest editorial],” IEEE Communications Magazine, vol. 52, no. 9, pp. 5254, Sept. 2014.CrossRefGoogle Scholar
[83] Niu, Y., Li, Y., Jin, D., Su, L., and Vasilakos, A. V., “A survey of millimeter wave communications (mmWave) for 5G: Opportunities and challenges,” Wireless Networks, vol. 21, no. 8, pp. 26572676, Nov. 2015.Google Scholar
[84] Xu, Y., Athanasiou, G., Fischione, C., and Tassiulas, L., “Distributed association control and relaying in millimeter wave wireless networks,” in IEEE ICC, Kuala Lumpur, Malaysia, May 2016, pp. 16.Google Scholar
[85] Xu, Y., Shokri-Ghadikolaei, H., and Fischione, C., “Auction based dynamic distributed association in millimeter wave networks,” in IEEE GLOBECOM, Washington, DC, Dec. 2016, pp. 16.Google Scholar
[86] Zhang, Y., Lee, C., Niyato, D., and Wang, P., “Auction approaches for resource allocation in wireless systems: A survey,” IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 10201041, 2013.CrossRefGoogle Scholar
[87] Asadi, A., Wang, Q., and Mancuso, V., “A survey on device-to-device communication in cellular networks,” IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 18011819, 2014.Google Scholar
[88] 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Service requirements for Machine-Type Communications (MTC); Stage 1 (Release 10) , 3GPP TS 22.368 V11.2.0 Standard, 2011.Google Scholar
[89] Ghavimi, F. and Chen, H.-H., “M2M communications in 3GPP LTE/LTE-A networks: Architectures, service requirements, challenges, and applications,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 525549, 2015.Google Scholar
[90] Kim, J., Lee, J., Kim, J., and Yun, J., “M2M service platforms: Survey, issues, and enabling technologies,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 6176, 2014.Google Scholar
[91] Ratasuk, R., Prasad, A., Li, Z., Ghosh, A., and Uusitalo, M. A., “Recent advancements in M2M communications in 4G networks and evolution towards 5G,” in 18th International Conference on Intelligence in Next Generation Networks, Paris, France, Feb. 2015, pp. 5257.Google Scholar
[92] Pourghebleh, B. and Navimipour, N. J., “Data aggregation mechanisms in the Internet of Things: A systematic review of the literature and recommendations for future research,” Journal of Network and Computer Applications, vol. 97, pp. 2334, Nov. 2017.Google Scholar
[93] Donoho, D. L., “Compressed sensing,” IEEE Transactions on Information Theory, vol. 52, no. 4, pp. 12891306, Apr. 2006.Google Scholar
[94] Cao, N., Brahma, S., and Varshney, P. K., “An incentive-based mechanism for location estimation in wireless sensor networks,” in IEEE GlobalSIP, Austin, TX, Dec. 2013, pp. 157160.Google Scholar
[95] Lee, J.-S. and Hoh, B., “Dynamic pricing incentive for participatory sensing,” Pervasive and Mobile Computing, vol. 6, no. 6, pp. 693708, Dec. 2010.Google Scholar
[96] Luo, T., Tan, H. P., and Xia, L., “Profit-maximizing incentive for participatory sensing,” in INFOCOM, Toronto, ON, Apr. 2014, pp. 127135.Google Scholar
[97] Krontiris, I. and Albers, A., “Monetary incentives in participatory sensing using multi-attributive auctions,” International Journal of Parallel, Emergent and Distributed Systems, vol. 27, no. 4, pp. 317336, Aug. 2012.Google Scholar
[98] Koutsopoulos, I., “Optimal incentive-driven design of participatory sensing systems,” in IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 14021410.Google Scholar
[99] Lan, K. and Wang, H., “On providing incentives to collect road traffic information,” in International Wireless Communications & Mobile Computing Conference (IWCMC 13), 2013.Google Scholar
[100] Luo, T. and Tham, C. K., “Fairness and social welfare in incentivizing participatory sensing,” in IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Seoul, South Korea, June 2012, pp. 425433.Google Scholar
[101] Pham, H. N., Sim, B. S., and Youn, H. Y., “A novel approach for selecting the participants to collect data in participatory sensing,” in IEEE 11th International Symposium on Applications and the Internet (SAINT), Bavaria, Germany, July 2011, pp. 5055.Google Scholar
[102] Nan, W., Guo, B., Huangfu, S., Yu, Z., Chen, H., and Zhou, X., “A cross-space, multi-interaction-based dynamic incentive mechanism for mobile crowd sensing,” in UUTC-ATC-ScalCom, Bali, Indonesia, Dec. 2014, pp. 179186.Google Scholar
[103] Schrage, D., Farnham, C., and Gonsalves, P. G., “A market-based optimization approach to sensor and resource management,” in Defense and Security Symposium, 2006, p. 62 290I.Google Scholar
[104] Edalat, N., Xiao, W., Roy, N., Das, S. K., and Motani, M., “Combinatorial auction-based task allocation in multi-application wireless sensor networks,” in 9th International Conference on Embedded and Ubiquitous Computing (EUC), Melbourne, VIC, Australia, Oct. 2011, pp. 174181.Google Scholar
[105] Liu, D., Wang, L., Chen, Y., Elkashlan, M., Wong, K., Schober, R., and Hanzo, L., “User association in 5G networks: A survey and an outlook,” IEEE Communications Surveys Tutorials, vol. 18, no. 2, pp. 10181044, 2016.Google Scholar
[106] Xu, Y., Hu, R. Q., Wei, L., and Wu, G., “QoE-aware mobile association and resource allocation over wireless heterogeneous networks,” in IEEE GLOBECOM, Austin, TX, Dec. 2014, pp. 46954701.Google Scholar
[107] Shokri-Ghadikolaei, H., Xu, Y., Gkatzikis, L., and Fischione, C., “User association and the alignment-throughput tradeoff in millimeter wave networks,” in International Forum on Research and Technologies for Society and Industry Leveraging, Turin, Italy, Sept. 2015, pp. 100105.Google Scholar
[108] Maghsudi, S. and Hossain, E., “Distributed downlink user association in small cell networks with energy harvesting,” in IEEE ICC, Kuala Lumpur, Malaysia, May 2016, pp. 16.Google Scholar
[109] Sun, R., Hong, M., and Luo, Z.-Q., “Joint downlink base station association and power control for max–min fairness: Computation and complexity,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 6, pp. 10401054, June 2015.Google Scholar
[110] Mao, Z., Nan, G., and Li, M., “A dynamic pricing scheme for congestion game in wireless machine-to-machine networks,” International Journal of Distributed Sensor Networks, vol. 8, no. 8, pp. 19, Jan. 2012.Google Scholar
[111] Romanous, B., Bitar, N., Imran, A., and Refai, H., “Network densification: Challenges and opportunities in enabling 5G,” in IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), Guildford, UK, Sept. 2015, pp. 129134.Google Scholar
[112] Jo, H., Mun, C., Moon, J., and Yook, J., “Interference mitigation using uplink power control for two-tier femtocell networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 49064910, Oct. 2009.Google Scholar
[113] Kandukuri, S. and Boyd, S., “Optimal power control in interference-limited fading wireless channels with outage-probability specifications,” IEEE Transactions on Wireless Communications, vol. 1, no. 1, pp. 4655, Jan. 2002.Google Scholar
[114] Kosta, C., Hunt, B., Quddus, A. U., and Tafazolli, R., “On interference avoidance through inter-cell interference coordination (ICIC) based on OFDMA mobile systems,” IEEE Communications Surveys Tutorials, vol. 15, no. 3, pp. 973995, 2013.Google Scholar
[115] Hasan, M. and Hossain, E., “Distributed resource allocation in D2D-enabled multi-tier cellular networks: An auction approach,” in IEEE ICC, London, June 2015, pp. 2949–2954.Google Scholar
[116] Lashgari, M., Maham, B., Kebriaei, H., and Saad, W., “Distributed power allocation and interference mitigation in two-tier femtocell networks: A game-theoretic approach,” in International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, Aug. 2015, pp. 5560.Google Scholar
[117] Chen, Y., Li, W., Hu, Y., and Zhu, Q., “Dormancy mechanism based power allocation in heterogeneous networks: A Stackelberg game approach,” Mobile Networks and Applications, vol. 22, no. 3, pp. 552563, June 2017.Google Scholar
[118] Duong, N. D., Madhukumar, A., and Niyato, D., “Stackelberg Bayesian game for power allocation in two-tier networks,” IEEE Transactions on Vehicular Technology, vol. 65, no. 4, pp. 23412354, Apr. 2016.Google Scholar
[119] “Toward cooperation by carrier aggregation in heterogeneous networks: A hierarchical game approach,” IEEE Transactions on Vehicular Technology, vol. 66, no. 2, pp. 1670– 1683, Feb. 2017.Google Scholar
[120] Gu, X., Zhang, X., Zhou, Z., Cheng, Y., and Peng, J., “Game theory based interference control approach in 5G ultra-dense heterogeneous networks,” in Asia-Pacific Services Computing Conference, Zhangjiajie, China, Nov. 2016, pp. 306319.Google Scholar
[121] Wang, Z., Hu, B., Wang, X., and Chen, S., “Interference pricing in 5G ultra-dense small cell networks: A Stackelberg game approach,” IET Communications, vol. 10, no. 15, pp. 18651872, Oct. 2016.Google Scholar
[122] Li, L., Zhao, G., and Blum, R. S., “A survey of caching techniques in cellular networks: Research issues and challenges in content placement and delivery strategies,” IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 17101732, 2018.Google Scholar
[123] Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S., et al., “Web caching and zipf-like distributions: Evidence and implications,” in IEEE INFOCOM, vol. 1, no. 1, New York, Mar. 1999, pp. 126134.Google Scholar
[124] Arlitt, M., Cherkasova, L., Dilley, J., Friedrich, R., and Jin, T., “Evaluating content management techniques for web proxy caches,” ACM SIGMETRICS Performance Evaluation Review, vol. 27, no. 4, pp. 311, Mar. 2000.Google Scholar
[125] Abrams, M., Standridge, C. R., Abdulla, G., Williams, S., and Fox, E. A., “Caching proxies: Limitations and potentials,” Department of Computer Science, Virginia Polytechnic Institute & State, Technical, Report, 1995.Google Scholar
[126] Zhou, H., Wang, H., Li, X., and Leung, V. C., “A survey on mobile data offloading technologies,” IEEE Access, vol. 6, pp. 51015111, Jan. 2018.Google Scholar
[127] Aijaz, A., Aghvami, H., and Amani, M., “A survey on mobile data offloading: Technical and business perspectives,” IEEE Wireless Communications, vol. 20, no. 2, pp. 104112, Apr. 2013.Google Scholar
[128] Bousia, A., Kartsakli, E., Antonopoulos, A., Alonso, L., and Verikoukis, C., “Auction-based offloading for base station switching off in heterogeneous networks,” in European Conference on Networks and Communications (EuCNC), Athens, Greece, June 2016, pp. 335339.Google Scholar
[129] Paris, S., Martisnon, F., Filippini, I., and Clien, L., “A bandwidth trading marketplace for mobile data offloading,” in IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 430434.Google Scholar
[130] Sken, F., Lin, P.-H., Sanguinetti, L., Debbah, M., and Jorswieck, E. A., “An energy-aware auction for hybrid access in heterogeneous networks under QoS requirements,” in IEEE ICASSP, Shanghai, China, Mar. 2016, pp. 36063610.Google Scholar
[131] Zhang, N., Cheng, N., Gamage, A. T., Zhang, K., Mark, J. W., and Shen, X., “Cloud assisted HetNets toward 5G wireless networks,” IEEE Communications Magazine, vol. 53, no. 6, pp. 5965, June 2015.Google Scholar
[132] Rebecchi, F., De Amorim, M. D., Conan, V., Passarella, A., Bruno, R., and Conti, M., “Data offloading techniques in cellular networks: A survey,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 580603, 2015.Google Scholar
[133] Yi, S., Naldurg, P., and Kravets, R., “Security-aware ad hoc routing for wireless networks,” in Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing. Long Beach, CA: ACM, Oct. 2001, pp. 299302.Google Scholar
[134] Su, X., Peng, G., and Chan, S., “Multi-path routing and forwarding in non-cooperative wireless networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 10, pp. 26382647, Aug. 2014.Google Scholar
[135] Delfs, H. and Knebl, H., “Symmetric-key encryption,” in Introduction to Cryptography. Berlin/Heidelberg: Springer, 2007, pp. 1131.Google Scholar
[136] Salomaa, A., Public-Key Cryptography. Berlin/Heidelberg: Springer Science & Business Media, 2013.Google Scholar
[137] Zou, Y., Zhu, J., Wang, X., and Leung, V. C., “Improving physical-layer security in wireless communications using diversity techniques,” IEEE Network, vol. 29, no. 1, pp. 4248, Jan. 2015.Google Scholar
[138] Bloch, M. and Barros, J., Physical-Layer Security: From Information Theory to Security Engineering. Cambridge: Cambridge University Press, 2011.Google Scholar
[139] Shiu, Y.-S., Chang, S. Y., Wu, H.-C., Huang, S. C.-H., and Chen, H.-H., “Physical layer security in wireless networks: A tutorial,” IEEE Wireless Communications, vol. 18, no. 2, pp. 6674, Apr. 2011.Google Scholar
[140] Barros, J. and Rodrigues, M. R., “Secrecy capacity of wireless channels,” in IEEE International Symposium on Information Theory, Seattle, WA, Dec. 2006, pp. 356360.Google Scholar
[141] Jorswieck, E. A., Wolf, A., and Gerbracht, S., Secrecy on the Physical Layer in Wireless Networks. London: INTECH Open Access Publisher, 2010.Google Scholar
[142] Dong, L., Han, Z., Petropulu, A. P., and Poor, H. V., “Improving wireless physical layer security via cooperating relays,” IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 18751888, Dec. 2010.Google Scholar
[143] Seong, K., Mohseni, M., and Cioffi, J. M., “Optimal resource allocation for OFDMA downlink systems,” in IEEE International Symposium on Information Theory, Seattle, WA, July 2006, pp. 13941398.Google Scholar
[144] Hasna, M. O. and Alouini, M.-S., “Optimal power allocation for relayed transmissions over Fayleigh-fading channels,” IEEE Transactions on Wireless Communications, vol. 3, no. 6, pp. 19992004, Nov. 2004.Google Scholar
[145] Zhu, H., Ninoslav, M., Debbah, M., and Hjorungnes, A., “Improved wireless secrecy capacity using distributed auction theory,” in 5th International Conference on Mobile Ad-Hoc and Sensor Networks, Fujian, China, Dec. 2009, pp. 442447.Google Scholar
[146] Zhang, Y., Zhang, R., Song, L., Han, Z., and Jiao, B., “Ascending clock auction for physical layer security,” in Physical Layer Security in Wireless Communications. Cambridge: Cambridge University Press, 2013, pp. 209235.Google Scholar
[147] Li, M., Guo, Y., Huang, K., and Guo, F., “Secure power and subcarrier auction in uplink full-duplex cellular networks,” China Communications, vol. 12, no. 1, pp. 157165, Jan. 2015.Google Scholar
[148] Wang, T., Song, L., Han, Z., and Jiao, B., “Improve secure communications in cognitive two-way relay networks using sequential second price auction,” in IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Aachen, Germany, May 2011, pp. 308315.Google Scholar
[149] Deng, J., Zhang, R., Song, L., Han, Z., and Jiao, B., “Truthful mechanisms for secure communication in wireless cooperative system,” IEEE Transactions on Wireless Communications, vol. 12, no. 9, pp. 42364245, Aug. 2013.Google Scholar
[150] Liu, S., Zhang, R., Song, L., Han, Z., and Jiao, B., “Enforce truth-telling in wireless relay networks for secure communication,” in IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 10711075.Google Scholar
[151] Stanojev, I. and Yener, A., “Cooperative jamming via spectrum leasing,” in International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Princeton, NJ, May 2011, pp. 265272.Google Scholar
[152] Wang, X., Ji, Y., Zhou, H., and Li, J., “Dasi: A truthful double auction mechanism for secure information transfer in cognitive radio networks,” in 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Seattle, WA, Jun. 2015, pp. 1927.Google Scholar
[153] Wang, X., Ji, Y., Zhou, H., and Li, J., “Auction based frameworks for secure communications in static and dynamic cognitive radio networks,” IEEE Transactions on Vehicular Technology, vol: 66, no: 3, pp. 26582673, Mar. 2017.Google Scholar
[154] Siyari, P., Krunz, M., and Nguyen, D. N., “Price-based friendly jamming in a MISO interference wiretap channel,” in IEEE INFOCOM, San Francisco, CA, Apr. 2016, pp. 19.Google Scholar
[155] Grover, K., Lim, A., and Yang, Q., “Jamming and anti-jamming techniques in wireless networks: A survey,” International Journal of Ad Hoc and Ubiquitous Computing, vol. 17, no. 4, pp. 197215, Dec. 2014.Google Scholar
[156] Liu, H., Liu, Z., Chen, Y., and Xu, W., “Determining the position of a jammer using a virtual-force iterative approach,” Wireless Networks, vol. 17, no. 2, pp. 531547, Feb. 2011.Google Scholar
[157] Tague, P., Slater, D., Poovendran, R., and Noubir, G., “Linear programming models for jamming attacks on network traffic flows,” in International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, Berlin, Germany, Apr. 2008, pp. 207216.Google Scholar
[158] Alnifie, G. and Simon, R., “A multi-channel defense against jamming attacks in wireless sensor networks,” in Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, New York, 2007, pp. 95104.Google Scholar
[159] Wood, A. D., Stankovic, J. A., and Son, S. H., “Jam: A jammed-area mapping service for sensor networks,” in IEEE Real-Time Systems Symposium, Cancun, Mexico, Dec. 2003, pp. 286297.Google Scholar
[160] Aasha Nandhini, S., Kishore, R., and Radha, S., “An efficient anti jamming technique for wireless sensor networks,” in International Conference on Recent Trends in Information Technology, Tamil Nadu, India, Apr. 2012, pp. 361366.Google Scholar
[161] Jain, S. K. and Garg, K., “A hybrid model of defense techniques against base station jamming attack in wireless sensor networks,” in 2009 First International Conference on Computational Intelligence, Communication Systems and Networks, July 2009, pp. 102–107.Google Scholar
[162] Popovski, P., Yomo, H., and Prasad, R., “Strategies for adaptive frequency hopping in the unlicensed bands,” IEEE Wireless Communications, vol. 13, no. 6, pp. 6067, Dec 2006.Google Scholar
[163] Popper, C., Strasser, M., and Capkun, S., “Anti-jamming broadcast communication using uncoordinated spread spectrum techniques,” IEEE Journal on Selected Areas in Communications, vol. 28, no. 5, pp. 703715, June 2010.CrossRefGoogle Scholar
[164] Zhang, L., Guan, Z., and Melodia, T., “Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying,” in IEEE INFOCOM, Toronto, Canada, Apr. 2014, pp. 549557.Google Scholar
[165] Zhang, L., Guan, Z., and Melodia, T., “United against the enemy: Anti-jamming based on cross-layer cooperation in wireless networks,” IEEE Transactions on Wireless Communications, vol. 15, no. 8, pp. 57335747, Aug. 2016.Google Scholar
[166] Tang, X., Ren, P., and Han, Z., “Combating full-duplex active eavesdropper: A game-theoretic perspective,” in IEEE ICC, Kuala Lumpur, Malaysia, Dec. 2016, pp. 16.Google Scholar
[167] Chorppath, A., Alpcan, T., and Boche, H., “Bayesian mechanisms and detection methods for wireless network with malicious users,” IEEE Transactions on Mobile Computing, vol. 15, no. 10, pp. 24522465, Oct. 2016.Google Scholar
[168] Zargar, S. T., Joshi, J., and Tipper, D., “A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks,” IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 20462069, Mar. 2013.Google Scholar
[169] Perkins, C., Belding-Royer, E., and Das, S.. Ad hoc on-demand distance vector (AODV) routing [Online]. (2003). Available: www.cs.cornell.edu/people/egs/615/aodv.pdfGoogle Scholar
[170] Agah, A., Basu, K., and Das, S. K., “Security enforcement in wireless sensor networks: A framework based on non-cooperative games,” Pervasive and Mobile Computing, vol. 2, no. 2, pp. 137158, Apr. 2006.Google Scholar
[171] Joshi, J. B., Aref, W. G., Ghafoor, A., and Spafford, E. H., “Security models for web-based applications,” Communications of the ACM, vol. 44, no. 2, pp. 3844, Feb. 2001.Google Scholar
[172] Information processing systems – Open Systems Interconnection – Basic Reference Model – Part 2: Security Architecture , ISO Standard 7498-2:1989 [Online]. (Feb. 1989). Available: www.iso.org/iso/catalogue-detail.htm?csnumber=14256Google Scholar
[173] Bashir, I., Serafini, E., and Wall, K., “Securing network software applications: Introduction,” Communications of the ACM, vol. 44, no. 2, pp. 2830, Feb. 2001.Google Scholar
[174] Stone, E. F., Gueutal, H. G., Gardner, D. G., and McClure, S., “A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations,” Journal of Applied Psychology, vol. 68, no. 3, pp. 459468, Aug. 1983.Google Scholar
[175] Stinson, D. R., Cryptography: Theory and Practice. Boca Raton, FL: CRC Press, 2005.Google Scholar
[176] Gruteser, M. and Grunwald, D., “Anonymous usage of location-based services through spatial and temporal cloaking,” in International Conference on Mobile Systems, Applications and Services, San Francisco, CA, May 2003, pp. 3142.Google Scholar
[177] Zhang, Y., Tong, W., and Zhong, S., “On designing satisfaction-ratio–aware truthful incentive mechanisms for k-anonymity location privacy,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 25282541, Nov. 2016.Google Scholar
[178] Yokoo, M., Sakurai, Y., and Matsubara, S., “Robust double auction protocol against false-name bids,” Decision Support Systems, vol. 39, no. 2, pp. 241252, Apr. 2005.Google Scholar
[179] Wang, Q., Ye, B., Tang, B., Xu, T., Guo, S., Lu, S., and Zhuang, W., “Robust large-scale spectrum auctions against false-name bids,” IEEE Transactions on Mobile Computing, vol: 16, no: 6, pp. 17301743, June 2017.Google Scholar
[180] Rathinakumar, S. and Marina, M. K., “Gavel: Strategy-proof ascending bid auction for dynamic licensed shared access,” in Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Paderborn, Germany, July 2016, pp. 121130.Google Scholar
[181] Wang, B., Wu, Y., Ji, Z., Liu, K. R., and Clancy, T. C., “Game theoretical mechanism design methods,” IEEE Signal Processing Magazine, vol. 25, no. 6, pp. 7484, Nov. 2008.Google Scholar
[182] Pan, M., Sun, J., and Fang, Y., “Purging the back-room dealing: Secure spectrum auction leveraging Paillier cryptosystem,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 4, pp. 866876, Mar. 2011.Google Scholar
[183] Krishna, V., Auction Theory. San Diego, CA: Academic Press, 2009.Google Scholar
[184] Osborne, M. J. et al., An Introduction to Game Theory. New York: Oxford University Press, 2004, vol. 3, no. 3.Google Scholar
[185] Han, Z., Niyato, D., Saad, W., Başar, T., and Hjørungnes, A., Game Theory in Wireless and Communication Networks: Theory, Models, and Applications. Cambridge: Cambridge University Press, 2012.Google Scholar
[186] Parkes, D. C., “Classic mechanism design,” Ph.D. dissertation, 2001.Google Scholar
[187] Satterthwaite, M. A. and Williams, S. R., “Bilateral trade with the sealed bid k-double auction: Existence and efficiency,” Journal of Economic Theory, vol. 48, no. 1, pp. 107– 133, June 1989.Google Scholar
[188] Hartline, J. D., Mechanism design and approximation, 2013.Google Scholar
[189] Lin, G.-Y. and Wei, H.-Y., “A multi-period resource auction scheme for machine-to-machine communications,” in IEEE International Conference on Communication Systems, Macau, China, Nov. 2014, pp. 177181.Google Scholar
[190] Gao, L., Li, P., Pan, Z., Liu, N., and You, X., “Virtualization framework and VCG based resource block allocation scheme for LTE virtualization,” in IEEE Vehicular Technology Conference, Nanjing, China, May 2016, pp. 16.Google Scholar
[191] Gui, Y., Zheng, Z., Wu, F., Gao, X., and Chen, G., “Soar: Strategy-proof auction mechanisms for distributed cloud bandwidth reservation,” in IEEE International Conference on Communication Systems, Macau, China, Nov. 2014, pp. 162166.Google Scholar
[192] Dütting, P., Feng, Z., Narasimhan, H., and Parkes, D. C., “Optimal auctions through deep learning,” arXiv preprint arXiv:1706.03459, 2017.Google Scholar
[193] Luong, N. C., Xiong, Z., Wang, P., and Niyato, D., “Optimal auction for edge computing resource management in mobile blockchain networks: A deep learning approach,” in IEEE International Conference on Communications (ICC), Kansas City, MO, May 2018, pp. 16.Google Scholar
[194] Myerson, R. B., “Optimal auction design,” Mathematics of Operations Research, vol. 6, no. 1, pp. 5873, Feb. 1981.Google Scholar
[195] Kawaguchi, K., “Deep learning without poor local minima,” in Advances in Neural Information Processing Systems, Barcelona, Spain, Dec. 2016, pp. 586594.Google Scholar
[196] Chen, Y., “Banking panics: The role of the first-come, first-served rule and information externalities,” Journal of Political Economy, vol. 107, no. 5, pp. 946968, Oct. 1999.Google Scholar
[197] McAfee, R. P. and McMillan, J., “Auctions and bidding,” Journal of Economic Literature, vol. 25, no. 2, pp. 699738, June 1987.Google Scholar
[198] Gizelis, C. A. and Vergados, D. D., “A survey of pricing schemes in wireless networks,” IEEE Communications Surveys & Tutorials, vol. 13, no. 1, pp. 126145, July 2010.Google Scholar
[199] Parsons, S., Rodriguez-Aguilar, J. A., and Klein, M., “Auctions and bidding: A guide for computer scientists,” ACM Computing Surveys (CSUR), vol. 43, no. 2, p. 10, Jan. 2011.CrossRefGoogle Scholar
[200] Koutsopoulos, I. and Iosifidis, G., “Auction mechanisms for network resource allocation,” in International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Avignon, France, May 2010, pp. 554563.Google Scholar
[201] Zhang, R., Song, L., Han, Z., and Jiao, B., “Ascending clock auction for physical layer security,” in Physical Layer Security in Wireless Communications. Boca Raton, FL: CRC Press, 2016, pp. 223249.Google Scholar
[202] Mochón, A., Sáez, Y., et al., Understanding Auctions. Basel, Switzerland: Springer, 2015.Google Scholar
[203] Goeree, J. K., “Bidding for the future: Signaling in auctions with an aftermarket,” Journal of Economic Theory, vol. 108, no. 2, pp. 345364, Feb. 2003.Google Scholar
[204] Wang, X., Li, Z., Xu, P., Xu, Y., Gao, X., and Chen, H.-H., “Spectrum sharing in cognitive radio networksan auction-based approach,” IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 40, no. 3, pp. 587596, Dec. 2010.Google Scholar
[205] Mochaourab, R., Holfeld, B., and Wirth, T., “Distributed channel assignment in cognitive radio networks: Stable matching and Walrasian equilibrium,” IEEE Transactions on Wireless Communications, vol. 14, no. 7, pp. 39243936, July 2015.Google Scholar
[206] Gul, F. and Stacchetti, E., “Walrasian equilibrium with gross substitutes,” Journal of Economic Theory, vol. 87, no. 1, pp. 95124, July 1999.Google Scholar
[207] Kuhn, H. W., “The Hungarian method for the assignment problem,” Naval Research Logistics (NRL), vol. 2, no. 1–2, pp. 8397, Mar. 1955.Google Scholar
[208] Reidt, S., Srivatsa, M., and Balfe, S., “The fable of the bees: Incentivizing robust revocation decision making in ad hoc networks,” in The 16th ACM Conference on Computer and Communications Security, Chicago, IL, Nov. 2009, pp. 291302.Google Scholar
[209] Lima, C. and De Abreu, G. T. F., “Game-theoretical relay selection strategy for geographic routing in multi-hop WSNs,” in IEEE 5th Workshop on Positioning, Navigation and Communication, Hannover, Germany, Mar. 2008, pp. 277283.Google Scholar
[210] Rodriguez, V. and Jondral, F., “Simple adaptively-prioritised spatially-reusable medium access control through the dutch auction: Qualitative analysis, issues, challenges,” in IEEE Symposium on Communications and Vehicular Technology, Delft, Netherlands, Nov. 2007, pp. 15.Google Scholar
[211] Cassady, R., Auctions and Auctioneering. Oakland: University of California Press, 1967.Google Scholar
[212] Lee, J.-S. and Hoh, B., “Sell your experiences: A market mechanism based incentive for participatory sensing,” in IEEE International Conference on Pervasive Computing and Communications (PerCom), Mannheim, Germany, Mar. 2010, pp. 6068.Google Scholar
[213] Edalat, N., Xiao, W., Tham, C. K., Keikha, E., and Ong, L. L., “A price-based adaptive task allocation for wireless sensor network,” in IEEE 6th International Conference on Mobile Ad Hoc and Sensor Systems, Macau, China, Oct. 2009, pp. 888893.Google Scholar
[214] Liu, Q., Xian, X., and Wu, T., “Game theoretic approach in routing protocol for cooperative wireless sensor networks,” in International Conference in Swarm Intelligence, Chongqing, China, June, 2011, pp. 207217.Google Scholar
[215] Mobile, W., “Real-time maps and traffic information based on the wisdom of the crowd.” Available: http://solsie.com/2009/09/real-time-maps-and-traffic-information-based-on-thewisdom-of-the-crowd/Google Scholar
[216] Liu, C. H., Hui, P., Branch, J. W., Bisdikian, C., and Yang, B., “Efficient network management for context-aware participatory sensing,” in SECON, Salt Lake City, UT, June 2011, pp. 116124.Google Scholar
[217] Tian, Y., Gu, Y., Ekici, E., and Özgüner, F., “Dynamic critical-path task mapping and scheduling for collaborative in-network processing in multi-hop wireless sensor networks,” in International Conference on Parallel Processing Workshops, Columbus, OH, Aug. 2006, pp. 215222.Google Scholar
[218] Wang, Y., Attebury, G., and Ramamurthy, B., “A survey of security issues in wireless sensor networks,” IEEE Communications Surveys and Tutorials, vol. 8, no. 2, pp. 223, 2006.Google Scholar
[219] Buchegger, S. and Le Boudec, J. Y., “Performance analysis of the confidant protocol,” in Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, June 2002, pp. 226236.Google Scholar
[220] Bolton, G. E. and Ockenfels, A., “ERC: A theory of equity, reciprocity, and competition,” American Economic Review, vol. 90, no. 1, pp. 166193, Mar. 2000.Google Scholar
[221] Vickrey, W., “Counterspeculation, auctions, and competitive sealed tenders,” Journal of Finance, vol. 16, no. 1, pp. 837, Mar. 1961.Google Scholar
[222] Lin, W.-Y., Lin, G.-Y., and Wei, H.-Y., “Dynamic auction mechanism for cloud resource allocation,” in IEEE/ACM International Conference on Cluster, Cloud and Grid Computing. Melbourne, Australia: IEEE Computer Society, May 2010, pp. 591592.Google Scholar
[223] Edalat, N., Tham, C.-K., and Xiao, W., “An auction-based strategy for distributed task allocation in wireless sensor networks,” Computer Communications, vol. 35, no. 8, pp. 916928, May 2012.Google Scholar
[224] Di, S., Wang, C.-L., Cheng, L., and Chen, L., “Social-optimized win–win resource allocation for self-organizing cloud,” in International Conference on Cloud and Service Computing (CSC), Hong Kong, China, Dec. 2011, pp. 251258.Google Scholar
[225] Di, S., Wang, C.-L., Zhang, W., and Cheng, L., “Probabilistic best-fit multi-dimensional range query in self-organizing cloud,” in International Conference on Parallel Processing (ICPP), Taipei, Taiwan, Sept. 2011, pp. 763772.Google Scholar
[226] Pinkas, B., “Cryptographic techniques for privacy-preserving data mining,” ACM SIGKDD Explorations Newsletter, vol. 4, no. 2, pp. 1219, Dec. 2002.Google Scholar
[227] Stanojev, I. and Yener, A., “Improving secrecy rate via spectrum leasing for friendly jamming,” IEEE Transactions on Wireless Communications, vol. 12, no. 1, pp. 134145, Jan. 2013.Google Scholar
[228] Corless, R. M., Gonnet, G. H., Hare, D. E., Jeffrey, D. J., and Knuth, D. E., “On the Lambert W function,” Advances in Computational Mathematics, vol. 5, no. 1, pp. 329359, Dec. 1996.Google Scholar
[229] Tekin, E. and Yener, A., “The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 27352751, 2008.Google Scholar
[230] Osborne, M. J. and Rubinstein, A., A Course in Game Theory. Cambridge, MA: MIT Press, 1994.Google Scholar
[231] Wang, X., Chen, X., and Wu, W., “Towards truthful auction mechanisms for task assignment in mobile device clouds,” in IEEE INFOCOM, Atlanta, GA, May 2017, pp. 19.Google Scholar
[232] Ahmadi, H., Macaluso, I., Gomez, I., DaSilva, L., and Doyle, L., “Virtualization of spatial streams for enhanced spectrum sharing,” in IEEE Global Communications Conference (GLOBECOM), Washington, DC, Dec. 2016, pp. 16.Google Scholar
[233] Dai, J., Liu, F., Li, B., Li, B., and Liu, J., “Collaborative caching in wireless video streaming through resource auctions,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 458466, Feb. 2012.Google Scholar
[234] Mas-Colell, A., Whinston, M. D., Green, J. R., et al., Microeconomic Theory. New York: Oxford University Press, 1995, vol. 1.Google Scholar
[235] Varian, H. R. and Harris, C., “The VCG auction in theory and practice,” American Economic Review, vol. 104, no. 5, pp. 442445, May 2014.Google Scholar
[236] Ausubel, L. M., Milgrom, P., et al., “The lovely but lonely vickrey auction,” Combinatorial Auctions, pp. 2226, 2006.Google Scholar
[237] Roughgarden, T., “Algorithmic game theory,” Communications of the ACM, vol. 53, no. 7, pp. 7886, 2010.Google Scholar
[238] Dobzinski, S. and Nisan, N., “Mechanisms for multi-unit auctions,” Journal of Artificial Intelligence Research, vol. 37, no. 1, pp. 8598, Feb. 2010.Google Scholar
[239] Jia, J., Zhang, Q., Zhang, Q., and Liu, M., “Revenue generation for truthful spectrum auction in dynamic spectrum access,” in Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing. New Orleans, LA: ACM, May 2009, pp. 312.Google Scholar
[240] Wu, Q., Zhou, M., Zhu, Q., and Xia, Y., “VCG auction-based dynamic pricing for multigranularity service composition,” IEEE Transactions on Automation Science and Engineering, vol. 15, no. 2, pp. 796805, May 2017.Google Scholar
[241] Dong, M., Sun, G., Wang, X., and Zhang, Q., “Combinatorial auction with time-frequency flexibility in cognitive radio networks,” in IEEE INFOCOM, Orlando, FL, Mar. 2012, pp. 22822290.Google Scholar
[242] Zhu, K. and Hossain, E., “Virtualization of 5G cellular networks as a hierarchical combinatorial auction,” IEEE Transactions on Mobile Computing, vol. 15, no. 10, pp. 26402654, Oct. 2016.Google Scholar
[243] Xu, C., Song, L., Han, Z., Zhao, Q., Wang, X., Cheng, X., and Jiao, B., “Efficiency resource allocation for device-to-device underlay communication systems: A reverse iterative combinatorial auction based approach,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 348358, Sept. 2013.Google Scholar
[244] Nisan, N., “Bidding languages,” in Combinatorial auctions. Cambridge, MA: MIT Press, 2006, pp. 121.Google Scholar
[245] Ausubel, L., Crampton, P., and Milgrom, P., “The clock-proxy auction: A practical combinatorial auction design,” in Handbook of Spectrum Auction Design. Cambridge: Cambridge University Press, 2017, pp. 119140.Google Scholar
[246] Bondy, J. A., Murty, U. S. R., et al., Graph Theory with Applications. London: Springer, 1976, vol. 290.Google Scholar
[247] Mu’Alem, A. and Nisan, N., “Truthful approximation mechanisms for restricted combinatorial auctions,” Games and Economic Behavior, vol. 64, no. 2, pp. 612631, Nov. 2008.Google Scholar
[248] Pikovsky, A., “Pricing and bidding strategies in iterative combinatorial auctions,” Ph.D. dissertation, Technische Universität München, 2008.Google Scholar
[249] Mullen, T. and Wellman, M. P., “Market-based negotiation for digital library services,” in Second USENIX Workshop on Electronic Commerce, vol. 13, Oakland, CA, Nov. 1996, pp. 259269.Google Scholar
[250] Williams, S. R. and Satterthwaite, M. A., The Bayesian Theory of the k-Double Auction. London: Routledge, 2018, pp. 99–124.Google Scholar
[251] McAfee, R. P., “A dominant strategy double auction,” Journal of Economic Theory, vol. 56, no. 2, pp. 434450, Apr. 1992.Google Scholar
[252] Chen, C. and Wang, Y., “Sparc: Strategy-proof double auction for mobile participatory sensing,” in International Conference on Cloud Computing and Big Data, Fuzhou, China, Dec. 2013, pp. 133140.Google Scholar
[253] Yang, D., Fang, X., and Xue, G., “Truthful incentive mechanisms for k-anonymity location privacy,” in IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 29943002.Google Scholar
[254] Xiang, L., Sun, G., Liu, J., Wang, X., and Li, L., “A discriminatory pricing double auction for spectrum allocation,” in IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China, Apr. 2012, pp. 14731477.Google Scholar
[255] Jin, A.-L., Song, W., Wang, P., Niyato, D., and Ju, P., “Auction mechanisms toward efficient resource sharing for cloudlets in mobile cloud computing,” IEEE Transactions on Services Computing, vol. 9, no. 6, pp. 895909, Nov. 2016.Google Scholar
[256] Rabin, M. O. and Thorpe, C., “Time-lapse cryptography,” Technical Report, TR-22-06 [Online]. (2006). Available: www.eecs.harvard.edu/~cat/tlc.pdfGoogle Scholar
[257] Bellare, M., Canetti, R., and Krawczyk, H., “Keying hash functions for message authentication,” in Annual International Cryptology Conference, vol. 1109. Santa Barbara, CA: Springer, July 1996, pp. 115.Google Scholar
[258] Sweeney, L., “k-Anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557570, Oct. 2002.Google Scholar
[259] Iachello, G., Smith, I., Consolvo, S., Abowd, G. D., Hughes, J., Howard, J., Potter, F., Scott, J., Sohn, T., Hightower, J., et al., “Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service,” in International Conference on Ubiquitous Computing. Tokyo: Springer, 2005, pp. 213231.Google Scholar
[260] Kido, H., Yanagisawa, Y., and Satoh, T., “An anonymous communication technique using dummies for location-based services,” in International Conference on Pervasive Services, Santorini, Greece, July 2005, pp. 8897.Google Scholar
[261] Zhou, X. and Zheng, H., “Trust: A general framework for truthful double spectrum auctions,” in IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp. 9991007.Google Scholar
[262] Zhou, X., Gandhi, S., Suri, S., and Zheng, H., “eBay in the sky: Strategy-proof wireless spectrum auctions,” in Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, CA, Sept. 2008, pp. 213.Google Scholar
[263] Parkes, D. C., Kalagnanam, J. R., and Eso, M., “Achieving budget-balance with Vickrey-based payment schemes in exchanges,” in International Joint Conferences on Artificial Intelligence, and American Association for Artificial Intelligence, San Francisco, CA, Aug. 2001, pp. 11611168.Google Scholar
[264] Boutilier, C., Goldszmidt, M., and Sabata, B., “Sequential auctions for the allocation of resources with complementarities,” in IJCAI, Stockholm, Sweden, Aug. 1999, pp. 527523.Google Scholar
[265] Milgrom, P. R. and Weber, R. J., “A theory of auctions and competitive bidding,” Econometrica: Journal of the Econometric Society, vol. 50, no. 5, pp. 10891122, Sept. 1982.Google Scholar
[266] Leme, R. P., Syrgkanis, V., and Tardos, É., “Sequential auctions and externalities,” in Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, Kyoto, Japan, Jan. 2012, pp. 869886.Google Scholar
[267] Wang, T., Zhang, R., Song, L., Han, Z., Li, H., and Jiao, B., “Power allocation for two-way relay system based on sequential second price auction,” Wireless Personal Communications, vol. 67, no. 1, pp. 4762, Nov. 2012.Google Scholar
[268] Bae, J., Beigman, E., Berry, R., Honig, M. L., and Vohra, R., “On the efficiency of sequential auctions for spectrum sharing,” in International Conference on Game Theory for Networks, Istanbul, Turkey, May 2009, pp. 199205.Google Scholar
[269] Wang, T., Song, L., Han, Z., Zhang, J., and Zhang, X., “Dynamic resource allocation in cognitive radio two-way relay networks using sequential auctions,” in IEEE International Wireless Symposium (IWS), Beijing, China, Apr. 2013, pp. 14.Google Scholar
[270] Errapotu, S. M., Li, H., Yu, R., Ren, S., Pei, Q., Pan, M., and Han, Z., “Clock auction inspired privacy preserving emergency demand response in colocation data centers,” IEEE Transactions on Dependable and Secure Computing, in press.Google Scholar
[271] Wang, T., Song, L., Han, Z., Cheng, X., and Jiao, B., “Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,” in IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, June 2012, pp. 16831687.Google Scholar
[272] Wang, A., Cai, Y., Guan, X., and Wang, S., “Physical layer security for multiuser two-way relay using distributed auction game,” in International Conference on Information Science and Technology (ICIST), Yangzhou, China, Mar. 2013, pp. 12021207.Google Scholar
[273] Zhang, R., Song, L., Han, Z., and Jiao, B., “Improve physical layer security in cooperative wireless network using distributed auction games,” in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Shanghai, China, June 2011, pp. 1823.Google Scholar
[274] Ausubel, L. M., “An efficient ascending-bid auction for multiple objects,” American Economic Review, vol. 94, no. 5, pp. 14521475, Dec. 2004.Google Scholar
[275] Huang, J., Han, Z., Chiang, M., and Poor, H. V., “Auction-based resource allocation for cooperative communications,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 7, pp. 12261237, Sept. 2008.Google Scholar
[276] Bapna, R., Goes, P., and Gupta, A., “A theoretical and empirical investigation of multi-item on-line auctions,” Information Technology and Management, vol. 1, no. 1–2, pp. 123, Jan. 2000.Google Scholar
[277] Karaliopoulos, M., Telelis, O., and Koutsopoulos, I., “User recruitment for mobile crowdsensing over opportunistic networks,” in IEEE Conference on Computer Communications (INFOCOM), Kowloon, Hong Kong, Apr. 2015, pp. 22542262.Google Scholar
[278] Wang, B. and Liu, K. R., “Advances in cognitive radio networks: A survey,” IEEE Journal of Selected Topics in Signal Processing, vol. 5, no. 1, pp. 523, Feb. 2011.Google Scholar
[279] Akyildiz, I. F., Lo, B. F., and Balakrishnan, R., “Cooperative spectrum sensing in cognitive radio networks: A survey,” Physical Communication, vol. 4, no. 1, pp. 4062, Mar. 2011.Google Scholar
[280] Shi, W., Zhang, L., Wu, C., Li, Z., and Lau, F., “An online auction framework for dynamic resource provisioning in cloud computing,” ACM SIGMETRICS Performance Evaluation Review, vol. 42, no. 1, pp. 7183, Aug. 2014.Google Scholar
[281] Sun, Y., Liu, F., Li, B., Li, B., and Zhang, X., “Fs2you: Peer-assisted semi-persistent online storage at a large scale,” in IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp. 873881.Google Scholar
[282] Davoli, A. and Mei, A., “Triton: A peer-assisted cloud storage system,” in Proceedings of the First Workshop on Principles and Practice of Eventual Consistency. Amsterdam, Netherlands: ACM, Apr. 2014, pp. 4:1–4:7.Google Scholar
[283] Zhao, J., Chu, X., Liu, H., Leung, Y.-W., and Li, Z., “Online procurement auctions for resource pooling in client-assisted cloud storage systems,” in IEEE Conference on Computer Communications (INFOCOM), Kowloon, China, Apr. 2015, pp. 576584.Google Scholar
[284] Mulder, F., van der Avoird, A., and Wormer, P. E., “Anisotropy of long range interactions between linear molecules: H2-H2 and H2-HE,” Molecular Physics, vol. 37, no. 1, pp. 159180, Aug. 1979.Google Scholar
[285] Gopinathan, A., Li, Z., and Wu, C., “Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets,” in IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 30203028.Google Scholar
[286] de Hoog, J., Alpcan, T., Brazil, M., Thomas, D. A., and Mareels, I., “A market mechanism for electric vehicle charging under network constraints,” IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 827836, Mar 2016.Google Scholar
[287] Holt, C. A. Jr. and Sherman, R., “Waiting-line auctions,” Journal of Political Economy, vol. 90, no. 2, pp. 280294, Apr. 1982.Google Scholar
[288] Wu, G., Ren, P., and Zhang, C., “A waiting-time auction based dynamic spectrum allocation algorithm in cognitive radio networks,” in IEEE Global Telecommunications Conference, Kathmandu, Nepal, Dec. 2011, pp. 15.Google Scholar
[289] Manelli, A. M. and Vincent, D. R., “Bundling as an optimal selling mechanism for a multiple-good monopolist,” Journal of Economic Theory, vol. 127, no. 1, pp. 135, Mar. 2006.Google Scholar
[290] Giannakopoulos, Y. and Koutsoupias, E., “Duality and optimality of auctions for uniform distributions,” in Proceedings of the Fifteenth ACM Conference on Economics and Computation, Palo Alto, CA, June 2014, pp. 259276.Google Scholar
[291] Yao, A. C.-C., “Dominant-strategy versus Bayesian multi-item auctions: Maximum revenue determination and comparison,” in Proceedings of the ACM Conference on Economics and Computation, Cambridge, MA, June 2017, pp. 320.Google Scholar
[292] Hornik, K., “Approximation capabilities of multilayer feedforward networks,” Neural Networks, vol. 4, no. 2, pp. 251257, Jan. 1991.Google Scholar
[293] Bertsekas, D. P., Constrained Optimization and Lagrange Multiplier Methods. New York: Academic Press, 2014.Google Scholar
[294] Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V., et al., “Blockchain technology: Beyond bitcoin,” Applied Innovation, vol. 2, no. 610, p. 71, June 2016.Google Scholar
[295] Bitcoin: A peer-to-peer electronic cash system [Online]. (2008). Available: https://bitcoin.org/bitcoin.pdfGoogle Scholar
[296] Xiong, Z., Zhang, Y., Niyato, D., Wang, P., and Han, Z., “When mobile blockchain meets edge computing,” IEEE Communications Magazine, vol. 56, no. 8, pp. 3339, Aug. 2018.Google Scholar
[297] Jiao, Y., Wang, P., Niyato, D., and Xiong, Z., “Social welfare maximization auction in edge computing resource allocation for mobile blockchain,” in 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, May 2018, pp. 16.Google Scholar
[298] Xiong, Z., Feng, S., Wang, W., Niyato, D., Wang, P., and Han, Z., “Cloud/fog computing resource management and pricing for blockchain networks,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 45854600, Jun. 2019.Google Scholar
[299] Houy, N., “The bitcoin mining game,” 2014, SSRN 2407834.Google Scholar
[302] Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C., Introduction to Algorithms. Cambridge, MA: MIT Press, 2009.Google Scholar
[303] Ausubel, L. M. and Cramton, P., “Vickrey auctions with reserve pricing,” Economic Theory, vol. 23, no. 3, pp. 493505, Apr. 2004.Google Scholar
[304] Gale, D. and Nikaido, H., “The Jacobian matrix and global univalence of mappings,” Mathematische Annalen, vol. 159, no. 2, pp. 8193, Apr. 1965.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×