Skip to main content Accessibility help
×
Home
  • Print publication year: 2020
  • Online publication date: May 2020

References

[1] Krishna, V., Auction Theory. San Diego, CA: Academic Press, 2002.
[2] Shubik, M., The Theory of Money and Financial Institutions: Volume 1. Cambridge, MA: MIT Press, 2004.
[3] Hekster, O., Rome and Its Empire, AD 193–284. Edinburgh: Edinburgh University Press, 2008.
[4] About auctions. Federal Communications Commission [Online]. (Dec. 2017). Available: www.fcc.gov/auctions/about-auctions
[5] Binmore, K. and Klemperer, P., “The biggest auction ever: The sale of the British 3G telecom licences,” Economic Journal, vol. 112, no. 478, pp. 7496, Apr. 2002.
[6] Results of auction. Ofcom [Online]. (Apr. 2018). Available: www.ofcom.org.uk
[7] The advantages of eBay for online sellers [Online]. (Jan. 2019). Available: www.channelreply.com/blog/view/advantages-of-ebay
[8] Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M., “Internet of Things (IoT): A vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 16451660, Sept. 2013.
[9] Brock, L., A naming scheme for physical objects [Online]. (2001). Available: http://cocoa.ethz.ch/downloads/2014/06/None-MIT-AUTOID-WH-002.pdf
[10] Roberto, M., Abyi, B., and Domenico, R., “Towards a definition of the Internet of Things (IoT),” Technical Report, 2015.
[11] Atzori, L., Iera, A., and Morabito, G., “The Internet of Things: A survey,” Computer Networks, vol. 54, no. 15, pp. 27872805, Oct. 2010.
[12] Ibid.
[13] Zhou, L., Chong, A., and Ngai, E., “Supply chain management in the era of the Internet of Things,” International Journal of Production Economics, vol. 159, no. 1, pp. 13, Oct. 2015.
[14] Sarkar, C., Nambi, S. N. A. U., Prasad, R. V., and Rahim, A., “A scalable distributed architecture towards unifying IoT applications,” in 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, Mar. 2014, pp. 508513.
[15] Borgia, E., “The Internet of Things vision: Key features, applications and open issues,” Computer Communications, vol. 54, pp. 131, Dec. 2014.
[16] Luong, N. C., Hoang, D. T., Wang, P., Niyato, D., Kim, D. I., and Han, Z., “Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey,” IEEE Communications Surveys & Tutorials, vol. 18, no. 4, pp. 25462590, 2016.
[17] Uckelmann, D., Harrison, M., and Michahelles, F., “An architectural approach towards the future Internet of Things,” in Architecting the Internet of Things. Berlin/Heidelberg: Springer, 2011, pp. 124.
[18] Gluhak, A., Krco, S., Nati, M., Pfisterer, D., Mitton, N., and Razafindralambo, T., “A survey on facilities for experimental Internet of Things research,” IEEE Communications Magazine, vol. 49, no. 11, pp. 5867, Nov. 2011.
[19] Nesse, P. J., Svaet, S., Strasunskas, D., and Gaivoronski, A. A., “Assessment and optimisation of business opportunities for telecom operators in the cloud value network,” Transactions on Emerging Telecommunications Technologies, vol. 24, no. 5, pp. 503516, June 2013.
[20] Sarvary, M. and Parker, P. M., “Marketing information: A competitive analysis,” Marketing Science, vol. 16, no. 1, pp. 2438, Feb. 1997.
[21] Feng, Y., Li, B., and Li, B., “Price competition in an oligopoly market with multiple iaas cloud providers,” IEEE Transactions on Computers, vol. 63, no. 1, pp. 5973, Jan. 2014.
[22] Niyato, D., Lu, X., Wang, P., Kim, D. I., and Han, Z., “Economics of Internet of Things (IoT): An information market approach,” IEEE Wireless Communications, vol. 23, no. 4, pp. 136145, Aug. 2016.
[23] Bin, S., Yuan, L., and Xiaoyi, W., “Research on data mining models for the Internet of Things,” in IEEE International Conference on Image Analysis and Signal Processing (IASP), Zhejiang, China, Apr. 2010, pp. 127132.
[24] Chen, Z., Xia, F., Huang, T., Bu, F., and Wang, H., “A localization method for the Internet of Things,” The Journal of Supercomputing, vol. 63, no. 3, pp. 657674, Mar. 2013.
[25] Location-based service revenues will grow to 34.8 billion euros in 2020. IoT Business News [Online]. (2015). Available: https://iotbusinessnews.com/2015/08/31/79312-location-based-service-revenues-will-grow-to-34-8-billion-euros-in-2020/
[26] Honicky, R., Brewer, E. A., Paulos, E., and White, R., “N-smarts: Networked suite of mobile atmospheric real-time sensors,” in Proceedings of the Second ACM SIGCOMM Workshop on Networked Systems for Developing Regions, Seattle, WA, Aug. 2008, pp. 2530.
[27] Ennis, M. and Rowe, R. K., “Hygienic biometric sensors,” July 2012, U.S. Patent 8,229,185.
[28] Gao, H., Liu, C. H., Wang, W., Zhao, J., Song, Z., Su, X., Crowcroft, J., and Leung, K. K., “A survey of incentive mechanisms for participatory sensing,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 918943, 2015.
[29] Jaimes, L. G., Vergara-Laurens, I. J., and Raij, A., “A survey of incentive techniques for mobile crowd sensing,” IEEE Journal Internet of Things, vol. 2, no. 5, pp. 370380, Oct. 2015.
[30] Zhang, X., Yang, Z., Sun, W., Liu, Y., Tang, S., Xing, K., and Mao, X., “Incentives for mobile crowd sensing: A survey,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 5467, 2016.
[31] Ganti, R. K., Ye, F., and Lei, H., “Mobile crowdsensing: Current state and future challenges,” IEEE Communications Magazine, vol. 49, no. 11, pp. 3239, Nov. 2011.
[32] Liu, J., Shen, H., Narman, H. S., Chung, W., and Lin, Z., “A survey of mobile crowdsensing techniques: A critical component for the Internet of Things,” ACM Transactions on Cyber-Physical Systems, vol. 2, no. 3, pp. 18:1–18:26, July 2018.
[33] Luong, N. C., Hoang, D. T., Wang, P., Niyato, D., and Han, Z., “Applications of economic and pricing models for wireless network security: A survey,” IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 27352767, 2017.
[34] Sultan, N., “Cloud computing for education: A new dawn?International Journal of Information Management, vol. 30, no. 2, pp. 109116, Apr. 2010.
[35] Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., and Venkatasubramanian, N., “Mobile cloud computing: A survey, state of art and future directions,” Mobile Networks and Applications, vol. 19, no. 2, pp. 133143, Apr. 2014.
[36] Kuo, M.-H., “Opportunities and challenges of cloud computing to improve health care services,” Journal of Medical Internet Research, vol. 13, no. 3, pp. 6789, Sept. 2011.
[37] Li, Z., Chen, C., and Wang, K., “Cloud computing for agent-based urban transportation systems,” IEEE Intelligent Systems, vol. 26, no. 1, pp. 7379, Feb. 2011.
[38] Chard, K., Caton, S., Rana, O. F., and Bubendorfer, K., “Social cloud: Cloud computing in social networks,” in International Conference on Cloud Computing, Miami, FL, July 2010, pp. 99106.
[39] Lawton, G., “Developing software online with platform-as-a-service technology,” Computer, vol. 41, no. 6, pp. 1315, June 2008.
[40] Bhardwaj, S., Jain, L., and Jain, S., “Cloud computing: A study of infrastructure as a service (IaaS),” International Journal of Engineering and Information Technology, vol. 2, no. 1, pp. 6063, 2010.
[41] Benlian, A. and Hess, T., “Opportunities and risks of software-as-a-service: Findings from a survey of IT Executives,” Decision Support Systems, vol. 52, no. 1, pp. 232246, Dec. 2011.
[42] Luong, N. C., Wang, P., Niyato, D., Wen, Y., and Han, Z., “Resource management in cloud networking using economic analysis and pricing models: A survey,” IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 9541001, 2017.
[43] Duan, Q., Yan, Y., and Vasilakos, A. V., “A survey on service-oriented network virtualization toward convergence of networking and cloud computing,” IEEE Transactions on Network and Service Management, vol. 9, no. 4, pp. 373392, Dec. 2012.
[44] Murray, P., Sefidcon, A., Steinert, R., Fusenig, V., and Carapinha, J., “Cloud networking: An infrastructure service architecture for the wide area,” in Future Network & Mobile Summit (FutureNetw), Berlin, Germany, July 2012.
[45] Xiang, X., Lin, C., Chen, F., and Chen, X., “Greening geo-distributed data centers by joint optimization of request routing and virtual machine scheduling,” in Proceedings of the IEEE/ACM 7th International Conference on Utility and Cloud Computing, London, UK, Dec. 2014.
[46] Bitar, N., Gringeri, S., and Xia, T. J., “Technologies and protocols for data center and cloud networking,” IEEE Communications Magazine, vol. 51, no. 9, pp. 2431, Sept. 2013.
[47] Levin, A. and Massonet, P., “Enabling federated cloud networking,” in Proceedings of the 8th ACM International Systems and Storage Conference. Haifa, Israel: ACM, May 2015, pp. 2323.
[48] Jamakovic, A., Bohnert, T. M., and Karagiannis, G., Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand. Berlin/Heidelberg: Springer, 2013.
[49] Karagiannis, G., Jamakovic, A., Edmonds, A., Parada, C., Metsch, T., Pichon, D., Corici, M., Ruffino, S., Gomes, A., Crosta, P. S., et al., “Mobile cloud networking: Virtualisation of cellular networks,” in 21st International Conference on Telecommunications (ICT), Lisbon, Portugal, May 2014, pp. 410415.
[50] Lewis, G., Echeverría, S., Simanta, S., Bradshaw, B., and Root, J., “Tactical cloudlets: Moving cloud computing to the edge,” in IEEE Military Communications Conference, Baltimore, MD, Oct. 2014, pp. 14401446.
[51] Stojmenovic, I. and Wen, S., “The fog computing paradigm: Scenarios and security issues,” in Federated Conference on Computer Science and Information Systems (FedCSIS), Warsaw, Poland, Sept. 2014.
[52] Ahlgren, B., Aranda, P. A., Chemouil, P., Oueslati, S., Correia, L. M., Karl, H., Söllner, M., and Welin, A., “Content, connectivity, and cloud: Ingredients for the network of the future,” IEEE Communications Magazine, vol. 49, no. 7, pp. 6270, June 2011.
[53] Beck, M. T., Werner, M., Feld, S., and Schimper, S., “Mobile edge computing: A taxonomy,” in Proceedings of the Sixth International Conference on Advances in Future Internet, Lisbon, Portugal, Nov. 2014, pp. 17.
[54] Smith, J. E. and Nair, R., “The architecture of virtual machines,” Computer, vol. 38, no. 5, pp. 3238, May 2005.
[55] Yuan, Y., Wang, C.-r., and Wang, C., “A game based approach for sharing the data center network,” in International Symposium on Neural Networks, Shenyang, China, July 2012, pp. 641649.
[56] Carella, G., Edmonds, A., Dudouet, F., Corici, M., Sousa, B., and Yousaf, Z., “Mobile cloud networking: From cloud, through NFV and beyond,” in IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), San Francisco, CA, Nov. 2015, pp. 78.
[57] Rost, P., Bernardos, C. J., De Domenico, A., Di Girolamo, M., Lalam, M., Maeder, A., Sabella, D., and Wübben, D., “Cloud technologies for flexible 5G radio access networks,” IEEE Communications Magazine, vol. 52, no. 5, pp. 6876, Sept. 2014.
[58] Peng, M., Wang, C., Lau, V., and Poor, H. V., “Fronthaul-constrained cloud radio access networks: Insights and challenges,” IEEE Wireless Communications, vol. 22, no. 2, pp. 152160, Apr. 2015.
[59] Checko, A., Christiansen, H. L., Yan, Y., Scolari, L., Kardaras, G., Berger, M. S., and Dittmann, L., “Cloud ran for mobile networks: A technology overview,” IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 405426, 2015.
[60] Greenberg, A., Hamilton, J., Maltz, D. A., and Patel, P., “The cost of a cloud: Research problems in data center networks,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 6873, Jan. 2008.
[61] Garcia Lopez, P., Montresor, A., Epema, D., Datta, A., Higashino, T., Iamnitchi, A., Barcellos, M., Felber, P., and Riviere, E., “Edge-centric computing: Vision and challenges,” ACM SIGCOMM Computer Communication Review, vol. 45, no. 5, pp. 3742, Oct. 2015.
[62] Ahmed, A. and Ahmed, E., “A survey on mobile edge computing,” in Proceedings of the 10th IEEE International Conference on Intelligent Systems and Control (ISCO 2016), Coimbatore, India, Jan. 2016, pp. 18.
[63] Shi, W., Cao, J., Zhang, Q., Li, Y., and Xu, L., “Edge computing: Vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637646, Oct. 2016.
[64] Mach, P. and Becvar, Z., “Mobile edge computing: A survey on architecture and computation offloading,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 16281656, 2017.
[65] Mao, Y., You, C., Zhang, J., Huang, K., and Letaief, K. B., “A survey on mobile edge computing: The communication perspective,” IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 23222358, 2017.
[66] Newslog, I.. IPTV standardization on track say industry experts [Online]. (2006). Available: www.itu.int/ITU-T/newslog/IPTV+Standardization+On+Track+Say+Industry+Experts .aspx
[67] Hua, K. A., Cai, Y., and Sheu, S., “Patching: A multicast technique for true video-on-demand services,” in Proceedings of the Sixth ACM International Conference on Multimedia. Bristol, UK: ACM, Sept. 1998, pp. 191200.
[68] Murray, P.. Cloud networking architecture description [Online]. (2012). Available: www.sail-project.eu/wp-content/uploads/2011/09/SAILDD1 finalpublic.pdf
[69] Liu, Z., Wang, Q., Huang, J., Wu, Y., Wang, Y., Jia, X., and Chen, H., “Cloud-based video-on-demand services for smart TV,” in International Conference on Information Science and Technology (ICIST), Da Nang, Vietnam, Apr. 2017, pp. 8184.
[70] Wu, Y., Wu, C., Li, B., Qiu, X., and Lau, F., “Cloudmedia: When cloud on demand meets video on demand,” in International Conference on Distributed Computing Systems (ICDCS), Minneapolis, MN, June 2011, pp. 268277.
[71] Agiwal, M., Roy, A., and Saxena, N., “Next generation 5G wireless networks: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 16171655, 2016.
[72] IMT vision framework and overall objectives of the future development of IMT for 2020 and beyond. ITU [Online]. Available: www.itu.int/
[73] Hossain, E. and Hasan, M., “5G cellular: Key enabling technologies and research challenges,” IEEE Instrumentation & Measurement Magazine, vol. 18, no. 3, pp. 1121, May 2015.
[74] Luong, N. C., Wang, P., Niyato, D., Liang, Y.-C., Han, Z., and Hou, F., “Applications of economic and pricing models for resource management in 5G wireless networks: A survey,” IEEE Communications Surveys & Tutorials, vol: 21, no: 4, pp. 32983339, 2018.
[75] Larsson, E. G., Edfors, O., Tufvesson, F., and Marzetta, T. L., “Massive MIMO for next generation wireless systems,” IEEE Communications Magazine, vol. 52, no. 2, pp. 186195, Feb. 2014.
[76] Di Renzo, M., Haas, H., Ghrayeb, A., Sugiura, S., and Hanzo, L., “Spatial modulation for generalized MIMO: Challenges, opportunities, and implementation,” Proceedings of the IEEE, vol. 102, no. 1, pp. 56103, Jan. 2014.
[77] Cramton, P. C., Shoham, Y., Steinberg, R., et al., Combinatorial Auctions. Cambridge, MA: MIT Press, 2006.
[78] Sawahashi, M., Kishiyama, Y., Morimoto, A., Nishikawa, D., and Tanno, M., “Coordinated multipoint transmission/reception techniques for LTE-advanced [coordinated and distributed MIMO],” IEEE Wireless Communications, vol. 17, no. 3, pp. 2634, June 2010.
[79] Kamel, M., Hamouda, W., and Youssef, A., “Ultra-dense networks: A survey,” IEEE Communications Surveys & Tutorials, vol. 18, no. 4, pp. 25222545, May 2016.
[80] Sediq, A. B., Gohary, R. H., Schoenen, R., and Yanikomeroglu, H., “Optimal tradeoff between sum-rate efficiency and Jain’s fairness index in resource allocation,” IEEE Transactions on Wireless Communications, vol. 12, no. 7, pp. 34963509, June 2013.
[81] IEEE 802.11ad. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications – amendment 3: Enhancements for very high throughput in the 60 GHz band , Standard, Dec. 2012.
[82] Elkashlan, M., Duong, T. Q., and Chen, H.-H., “Millimeter-wave communications for 5G: Fundamentals: Part I [Guest editorial],” IEEE Communications Magazine, vol. 52, no. 9, pp. 5254, Sept. 2014.
[83] Niu, Y., Li, Y., Jin, D., Su, L., and Vasilakos, A. V., “A survey of millimeter wave communications (mmWave) for 5G: Opportunities and challenges,” Wireless Networks, vol. 21, no. 8, pp. 26572676, Nov. 2015.
[84] Xu, Y., Athanasiou, G., Fischione, C., and Tassiulas, L., “Distributed association control and relaying in millimeter wave wireless networks,” in IEEE ICC, Kuala Lumpur, Malaysia, May 2016, pp. 16.
[85] Xu, Y., Shokri-Ghadikolaei, H., and Fischione, C., “Auction based dynamic distributed association in millimeter wave networks,” in IEEE GLOBECOM, Washington, DC, Dec. 2016, pp. 16.
[86] Zhang, Y., Lee, C., Niyato, D., and Wang, P., “Auction approaches for resource allocation in wireless systems: A survey,” IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 10201041, 2013.
[87] Asadi, A., Wang, Q., and Mancuso, V., “A survey on device-to-device communication in cellular networks,” IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 18011819, 2014.
[88] 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Service requirements for Machine-Type Communications (MTC); Stage 1 (Release 10) , 3GPP TS 22.368 V11.2.0 Standard, 2011.
[89] Ghavimi, F. and Chen, H.-H., “M2M communications in 3GPP LTE/LTE-A networks: Architectures, service requirements, challenges, and applications,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 525549, 2015.
[90] Kim, J., Lee, J., Kim, J., and Yun, J., “M2M service platforms: Survey, issues, and enabling technologies,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 6176, 2014.
[91] Ratasuk, R., Prasad, A., Li, Z., Ghosh, A., and Uusitalo, M. A., “Recent advancements in M2M communications in 4G networks and evolution towards 5G,” in 18th International Conference on Intelligence in Next Generation Networks, Paris, France, Feb. 2015, pp. 5257.
[92] Pourghebleh, B. and Navimipour, N. J., “Data aggregation mechanisms in the Internet of Things: A systematic review of the literature and recommendations for future research,” Journal of Network and Computer Applications, vol. 97, pp. 2334, Nov. 2017.
[93] Donoho, D. L., “Compressed sensing,” IEEE Transactions on Information Theory, vol. 52, no. 4, pp. 12891306, Apr. 2006.
[94] Cao, N., Brahma, S., and Varshney, P. K., “An incentive-based mechanism for location estimation in wireless sensor networks,” in IEEE GlobalSIP, Austin, TX, Dec. 2013, pp. 157160.
[95] Lee, J.-S. and Hoh, B., “Dynamic pricing incentive for participatory sensing,” Pervasive and Mobile Computing, vol. 6, no. 6, pp. 693708, Dec. 2010.
[96] Luo, T., Tan, H. P., and Xia, L., “Profit-maximizing incentive for participatory sensing,” in INFOCOM, Toronto, ON, Apr. 2014, pp. 127135.
[97] Krontiris, I. and Albers, A., “Monetary incentives in participatory sensing using multi-attributive auctions,” International Journal of Parallel, Emergent and Distributed Systems, vol. 27, no. 4, pp. 317336, Aug. 2012.
[98] Koutsopoulos, I., “Optimal incentive-driven design of participatory sensing systems,” in IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 14021410.
[99] Lan, K. and Wang, H., “On providing incentives to collect road traffic information,” in International Wireless Communications & Mobile Computing Conference (IWCMC 13), 2013.
[100] Luo, T. and Tham, C. K., “Fairness and social welfare in incentivizing participatory sensing,” in IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Seoul, South Korea, June 2012, pp. 425433.
[101] Pham, H. N., Sim, B. S., and Youn, H. Y., “A novel approach for selecting the participants to collect data in participatory sensing,” in IEEE 11th International Symposium on Applications and the Internet (SAINT), Bavaria, Germany, July 2011, pp. 5055.
[102] Nan, W., Guo, B., Huangfu, S., Yu, Z., Chen, H., and Zhou, X., “A cross-space, multi-interaction-based dynamic incentive mechanism for mobile crowd sensing,” in UUTC-ATC-ScalCom, Bali, Indonesia, Dec. 2014, pp. 179186.
[103] Schrage, D., Farnham, C., and Gonsalves, P. G., “A market-based optimization approach to sensor and resource management,” in Defense and Security Symposium, 2006, p. 62 290I.
[104] Edalat, N., Xiao, W., Roy, N., Das, S. K., and Motani, M., “Combinatorial auction-based task allocation in multi-application wireless sensor networks,” in 9th International Conference on Embedded and Ubiquitous Computing (EUC), Melbourne, VIC, Australia, Oct. 2011, pp. 174181.
[105] Liu, D., Wang, L., Chen, Y., Elkashlan, M., Wong, K., Schober, R., and Hanzo, L., “User association in 5G networks: A survey and an outlook,” IEEE Communications Surveys Tutorials, vol. 18, no. 2, pp. 10181044, 2016.
[106] Xu, Y., Hu, R. Q., Wei, L., and Wu, G., “QoE-aware mobile association and resource allocation over wireless heterogeneous networks,” in IEEE GLOBECOM, Austin, TX, Dec. 2014, pp. 46954701.
[107] Shokri-Ghadikolaei, H., Xu, Y., Gkatzikis, L., and Fischione, C., “User association and the alignment-throughput tradeoff in millimeter wave networks,” in International Forum on Research and Technologies for Society and Industry Leveraging, Turin, Italy, Sept. 2015, pp. 100105.
[108] Maghsudi, S. and Hossain, E., “Distributed downlink user association in small cell networks with energy harvesting,” in IEEE ICC, Kuala Lumpur, Malaysia, May 2016, pp. 16.
[109] Sun, R., Hong, M., and Luo, Z.-Q., “Joint downlink base station association and power control for max–min fairness: Computation and complexity,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 6, pp. 10401054, June 2015.
[110] Mao, Z., Nan, G., and Li, M., “A dynamic pricing scheme for congestion game in wireless machine-to-machine networks,” International Journal of Distributed Sensor Networks, vol. 8, no. 8, pp. 19, Jan. 2012.
[111] Romanous, B., Bitar, N., Imran, A., and Refai, H., “Network densification: Challenges and opportunities in enabling 5G,” in IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), Guildford, UK, Sept. 2015, pp. 129134.
[112] Jo, H., Mun, C., Moon, J., and Yook, J., “Interference mitigation using uplink power control for two-tier femtocell networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 49064910, Oct. 2009.
[113] Kandukuri, S. and Boyd, S., “Optimal power control in interference-limited fading wireless channels with outage-probability specifications,” IEEE Transactions on Wireless Communications, vol. 1, no. 1, pp. 4655, Jan. 2002.
[114] Kosta, C., Hunt, B., Quddus, A. U., and Tafazolli, R., “On interference avoidance through inter-cell interference coordination (ICIC) based on OFDMA mobile systems,” IEEE Communications Surveys Tutorials, vol. 15, no. 3, pp. 973995, 2013.
[115] Hasan, M. and Hossain, E., “Distributed resource allocation in D2D-enabled multi-tier cellular networks: An auction approach,” in IEEE ICC, London, June 2015, pp. 2949–2954.
[116] Lashgari, M., Maham, B., Kebriaei, H., and Saad, W., “Distributed power allocation and interference mitigation in two-tier femtocell networks: A game-theoretic approach,” in International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, Aug. 2015, pp. 5560.
[117] Chen, Y., Li, W., Hu, Y., and Zhu, Q., “Dormancy mechanism based power allocation in heterogeneous networks: A Stackelberg game approach,” Mobile Networks and Applications, vol. 22, no. 3, pp. 552563, June 2017.
[118] Duong, N. D., Madhukumar, A., and Niyato, D., “Stackelberg Bayesian game for power allocation in two-tier networks,” IEEE Transactions on Vehicular Technology, vol. 65, no. 4, pp. 23412354, Apr. 2016.
[119] “Toward cooperation by carrier aggregation in heterogeneous networks: A hierarchical game approach,” IEEE Transactions on Vehicular Technology, vol. 66, no. 2, pp. 1670– 1683, Feb. 2017.
[120] Gu, X., Zhang, X., Zhou, Z., Cheng, Y., and Peng, J., “Game theory based interference control approach in 5G ultra-dense heterogeneous networks,” in Asia-Pacific Services Computing Conference, Zhangjiajie, China, Nov. 2016, pp. 306319.
[121] Wang, Z., Hu, B., Wang, X., and Chen, S., “Interference pricing in 5G ultra-dense small cell networks: A Stackelberg game approach,” IET Communications, vol. 10, no. 15, pp. 18651872, Oct. 2016.
[122] Li, L., Zhao, G., and Blum, R. S., “A survey of caching techniques in cellular networks: Research issues and challenges in content placement and delivery strategies,” IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 17101732, 2018.
[123] Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S., et al., “Web caching and zipf-like distributions: Evidence and implications,” in IEEE INFOCOM, vol. 1, no. 1, New York, Mar. 1999, pp. 126134.
[124] Arlitt, M., Cherkasova, L., Dilley, J., Friedrich, R., and Jin, T., “Evaluating content management techniques for web proxy caches,” ACM SIGMETRICS Performance Evaluation Review, vol. 27, no. 4, pp. 311, Mar. 2000.
[125] Abrams, M., Standridge, C. R., Abdulla, G., Williams, S., and Fox, E. A., “Caching proxies: Limitations and potentials,” Department of Computer Science, Virginia Polytechnic Institute & State, Technical, Report, 1995.
[126] Zhou, H., Wang, H., Li, X., and Leung, V. C., “A survey on mobile data offloading technologies,” IEEE Access, vol. 6, pp. 51015111, Jan. 2018.
[127] Aijaz, A., Aghvami, H., and Amani, M., “A survey on mobile data offloading: Technical and business perspectives,” IEEE Wireless Communications, vol. 20, no. 2, pp. 104112, Apr. 2013.
[128] Bousia, A., Kartsakli, E., Antonopoulos, A., Alonso, L., and Verikoukis, C., “Auction-based offloading for base station switching off in heterogeneous networks,” in European Conference on Networks and Communications (EuCNC), Athens, Greece, June 2016, pp. 335339.
[129] Paris, S., Martisnon, F., Filippini, I., and Clien, L., “A bandwidth trading marketplace for mobile data offloading,” in IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 430434.
[130] Sken, F., Lin, P.-H., Sanguinetti, L., Debbah, M., and Jorswieck, E. A., “An energy-aware auction for hybrid access in heterogeneous networks under QoS requirements,” in IEEE ICASSP, Shanghai, China, Mar. 2016, pp. 36063610.
[131] Zhang, N., Cheng, N., Gamage, A. T., Zhang, K., Mark, J. W., and Shen, X., “Cloud assisted HetNets toward 5G wireless networks,” IEEE Communications Magazine, vol. 53, no. 6, pp. 5965, June 2015.
[132] Rebecchi, F., De Amorim, M. D., Conan, V., Passarella, A., Bruno, R., and Conti, M., “Data offloading techniques in cellular networks: A survey,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 580603, 2015.
[133] Yi, S., Naldurg, P., and Kravets, R., “Security-aware ad hoc routing for wireless networks,” in Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing. Long Beach, CA: ACM, Oct. 2001, pp. 299302.
[134] Su, X., Peng, G., and Chan, S., “Multi-path routing and forwarding in non-cooperative wireless networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 10, pp. 26382647, Aug. 2014.
[135] Delfs, H. and Knebl, H., “Symmetric-key encryption,” in Introduction to Cryptography. Berlin/Heidelberg: Springer, 2007, pp. 1131.
[136] Salomaa, A., Public-Key Cryptography. Berlin/Heidelberg: Springer Science & Business Media, 2013.
[137] Zou, Y., Zhu, J., Wang, X., and Leung, V. C., “Improving physical-layer security in wireless communications using diversity techniques,” IEEE Network, vol. 29, no. 1, pp. 4248, Jan. 2015.
[138] Bloch, M. and Barros, J., Physical-Layer Security: From Information Theory to Security Engineering. Cambridge: Cambridge University Press, 2011.
[139] Shiu, Y.-S., Chang, S. Y., Wu, H.-C., Huang, S. C.-H., and Chen, H.-H., “Physical layer security in wireless networks: A tutorial,” IEEE Wireless Communications, vol. 18, no. 2, pp. 6674, Apr. 2011.
[140] Barros, J. and Rodrigues, M. R., “Secrecy capacity of wireless channels,” in IEEE International Symposium on Information Theory, Seattle, WA, Dec. 2006, pp. 356360.
[141] Jorswieck, E. A., Wolf, A., and Gerbracht, S., Secrecy on the Physical Layer in Wireless Networks. London: INTECH Open Access Publisher, 2010.
[142] Dong, L., Han, Z., Petropulu, A. P., and Poor, H. V., “Improving wireless physical layer security via cooperating relays,” IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 18751888, Dec. 2010.
[143] Seong, K., Mohseni, M., and Cioffi, J. M., “Optimal resource allocation for OFDMA downlink systems,” in IEEE International Symposium on Information Theory, Seattle, WA, July 2006, pp. 13941398.
[144] Hasna, M. O. and Alouini, M.-S., “Optimal power allocation for relayed transmissions over Fayleigh-fading channels,” IEEE Transactions on Wireless Communications, vol. 3, no. 6, pp. 19992004, Nov. 2004.
[145] Zhu, H., Ninoslav, M., Debbah, M., and Hjorungnes, A., “Improved wireless secrecy capacity using distributed auction theory,” in 5th International Conference on Mobile Ad-Hoc and Sensor Networks, Fujian, China, Dec. 2009, pp. 442447.
[146] Zhang, Y., Zhang, R., Song, L., Han, Z., and Jiao, B., “Ascending clock auction for physical layer security,” in Physical Layer Security in Wireless Communications. Cambridge: Cambridge University Press, 2013, pp. 209235.
[147] Li, M., Guo, Y., Huang, K., and Guo, F., “Secure power and subcarrier auction in uplink full-duplex cellular networks,” China Communications, vol. 12, no. 1, pp. 157165, Jan. 2015.
[148] Wang, T., Song, L., Han, Z., and Jiao, B., “Improve secure communications in cognitive two-way relay networks using sequential second price auction,” in IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Aachen, Germany, May 2011, pp. 308315.
[149] Deng, J., Zhang, R., Song, L., Han, Z., and Jiao, B., “Truthful mechanisms for secure communication in wireless cooperative system,” IEEE Transactions on Wireless Communications, vol. 12, no. 9, pp. 42364245, Aug. 2013.
[150] Liu, S., Zhang, R., Song, L., Han, Z., and Jiao, B., “Enforce truth-telling in wireless relay networks for secure communication,” in IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 10711075.
[151] Stanojev, I. and Yener, A., “Cooperative jamming via spectrum leasing,” in International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Princeton, NJ, May 2011, pp. 265272.
[152] Wang, X., Ji, Y., Zhou, H., and Li, J., “Dasi: A truthful double auction mechanism for secure information transfer in cognitive radio networks,” in 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Seattle, WA, Jun. 2015, pp. 1927.
[153] Wang, X., Ji, Y., Zhou, H., and Li, J., “Auction based frameworks for secure communications in static and dynamic cognitive radio networks,” IEEE Transactions on Vehicular Technology, vol: 66, no: 3, pp. 26582673, Mar. 2017.
[154] Siyari, P., Krunz, M., and Nguyen, D. N., “Price-based friendly jamming in a MISO interference wiretap channel,” in IEEE INFOCOM, San Francisco, CA, Apr. 2016, pp. 19.
[155] Grover, K., Lim, A., and Yang, Q., “Jamming and anti-jamming techniques in wireless networks: A survey,” International Journal of Ad Hoc and Ubiquitous Computing, vol. 17, no. 4, pp. 197215, Dec. 2014.
[156] Liu, H., Liu, Z., Chen, Y., and Xu, W., “Determining the position of a jammer using a virtual-force iterative approach,” Wireless Networks, vol. 17, no. 2, pp. 531547, Feb. 2011.
[157] Tague, P., Slater, D., Poovendran, R., and Noubir, G., “Linear programming models for jamming attacks on network traffic flows,” in International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, Berlin, Germany, Apr. 2008, pp. 207216.
[158] Alnifie, G. and Simon, R., “A multi-channel defense against jamming attacks in wireless sensor networks,” in Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, New York, 2007, pp. 95104.
[159] Wood, A. D., Stankovic, J. A., and Son, S. H., “Jam: A jammed-area mapping service for sensor networks,” in IEEE Real-Time Systems Symposium, Cancun, Mexico, Dec. 2003, pp. 286297.
[160] Aasha Nandhini, S., Kishore, R., and Radha, S., “An efficient anti jamming technique for wireless sensor networks,” in International Conference on Recent Trends in Information Technology, Tamil Nadu, India, Apr. 2012, pp. 361366.
[161] Jain, S. K. and Garg, K., “A hybrid model of defense techniques against base station jamming attack in wireless sensor networks,” in 2009 First International Conference on Computational Intelligence, Communication Systems and Networks, July 2009, pp. 102–107.
[162] Popovski, P., Yomo, H., and Prasad, R., “Strategies for adaptive frequency hopping in the unlicensed bands,” IEEE Wireless Communications, vol. 13, no. 6, pp. 6067, Dec 2006.
[163] Popper, C., Strasser, M., and Capkun, S., “Anti-jamming broadcast communication using uncoordinated spread spectrum techniques,” IEEE Journal on Selected Areas in Communications, vol. 28, no. 5, pp. 703715, June 2010.
[164] Zhang, L., Guan, Z., and Melodia, T., “Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying,” in IEEE INFOCOM, Toronto, Canada, Apr. 2014, pp. 549557.
[165] Zhang, L., Guan, Z., and Melodia, T., “United against the enemy: Anti-jamming based on cross-layer cooperation in wireless networks,” IEEE Transactions on Wireless Communications, vol. 15, no. 8, pp. 57335747, Aug. 2016.
[166] Tang, X., Ren, P., and Han, Z., “Combating full-duplex active eavesdropper: A game-theoretic perspective,” in IEEE ICC, Kuala Lumpur, Malaysia, Dec. 2016, pp. 16.
[167] Chorppath, A., Alpcan, T., and Boche, H., “Bayesian mechanisms and detection methods for wireless network with malicious users,” IEEE Transactions on Mobile Computing, vol. 15, no. 10, pp. 24522465, Oct. 2016.
[168] Zargar, S. T., Joshi, J., and Tipper, D., “A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks,” IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 20462069, Mar. 2013.
[169] Perkins, C., Belding-Royer, E., and Das, S.. Ad hoc on-demand distance vector (AODV) routing [Online]. (2003). Available: www.cs.cornell.edu/people/egs/615/aodv.pdf
[170] Agah, A., Basu, K., and Das, S. K., “Security enforcement in wireless sensor networks: A framework based on non-cooperative games,” Pervasive and Mobile Computing, vol. 2, no. 2, pp. 137158, Apr. 2006.
[171] Joshi, J. B., Aref, W. G., Ghafoor, A., and Spafford, E. H., “Security models for web-based applications,” Communications of the ACM, vol. 44, no. 2, pp. 3844, Feb. 2001.
[172] Information processing systems – Open Systems Interconnection – Basic Reference Model – Part 2: Security Architecture , ISO Standard 7498-2:1989 [Online]. (Feb. 1989). Available: www.iso.org/iso/catalogue-detail.htm?csnumber=14256
[173] Bashir, I., Serafini, E., and Wall, K., “Securing network software applications: Introduction,” Communications of the ACM, vol. 44, no. 2, pp. 2830, Feb. 2001.
[174] Stone, E. F., Gueutal, H. G., Gardner, D. G., and McClure, S., “A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations,” Journal of Applied Psychology, vol. 68, no. 3, pp. 459468, Aug. 1983.
[175] Stinson, D. R., Cryptography: Theory and Practice. Boca Raton, FL: CRC Press, 2005.
[176] Gruteser, M. and Grunwald, D., “Anonymous usage of location-based services through spatial and temporal cloaking,” in International Conference on Mobile Systems, Applications and Services, San Francisco, CA, May 2003, pp. 3142.
[177] Zhang, Y., Tong, W., and Zhong, S., “On designing satisfaction-ratio–aware truthful incentive mechanisms for k-anonymity location privacy,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 25282541, Nov. 2016.
[178] Yokoo, M., Sakurai, Y., and Matsubara, S., “Robust double auction protocol against false-name bids,” Decision Support Systems, vol. 39, no. 2, pp. 241252, Apr. 2005.
[179] Wang, Q., Ye, B., Tang, B., Xu, T., Guo, S., Lu, S., and Zhuang, W., “Robust large-scale spectrum auctions against false-name bids,” IEEE Transactions on Mobile Computing, vol: 16, no: 6, pp. 17301743, June 2017.
[180] Rathinakumar, S. and Marina, M. K., “Gavel: Strategy-proof ascending bid auction for dynamic licensed shared access,” in Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Paderborn, Germany, July 2016, pp. 121130.
[181] Wang, B., Wu, Y., Ji, Z., Liu, K. R., and Clancy, T. C., “Game theoretical mechanism design methods,” IEEE Signal Processing Magazine, vol. 25, no. 6, pp. 7484, Nov. 2008.
[182] Pan, M., Sun, J., and Fang, Y., “Purging the back-room dealing: Secure spectrum auction leveraging Paillier cryptosystem,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 4, pp. 866876, Mar. 2011.
[183] Krishna, V., Auction Theory. San Diego, CA: Academic Press, 2009.
[184] Osborne, M. J. et al., An Introduction to Game Theory. New York: Oxford University Press, 2004, vol. 3, no. 3.
[185] Han, Z., Niyato, D., Saad, W., Başar, T., and Hjørungnes, A., Game Theory in Wireless and Communication Networks: Theory, Models, and Applications. Cambridge: Cambridge University Press, 2012.
[186] Parkes, D. C., “Classic mechanism design,” Ph.D. dissertation, 2001.
[187] Satterthwaite, M. A. and Williams, S. R., “Bilateral trade with the sealed bid k-double auction: Existence and efficiency,” Journal of Economic Theory, vol. 48, no. 1, pp. 107– 133, June 1989.
[188] Hartline, J. D., Mechanism design and approximation, 2013.
[189] Lin, G.-Y. and Wei, H.-Y., “A multi-period resource auction scheme for machine-to-machine communications,” in IEEE International Conference on Communication Systems, Macau, China, Nov. 2014, pp. 177181.
[190] Gao, L., Li, P., Pan, Z., Liu, N., and You, X., “Virtualization framework and VCG based resource block allocation scheme for LTE virtualization,” in IEEE Vehicular Technology Conference, Nanjing, China, May 2016, pp. 16.
[191] Gui, Y., Zheng, Z., Wu, F., Gao, X., and Chen, G., “Soar: Strategy-proof auction mechanisms for distributed cloud bandwidth reservation,” in IEEE International Conference on Communication Systems, Macau, China, Nov. 2014, pp. 162166.
[192] Dütting, P., Feng, Z., Narasimhan, H., and Parkes, D. C., “Optimal auctions through deep learning,” arXiv preprint arXiv:1706.03459, 2017.
[193] Luong, N. C., Xiong, Z., Wang, P., and Niyato, D., “Optimal auction for edge computing resource management in mobile blockchain networks: A deep learning approach,” in IEEE International Conference on Communications (ICC), Kansas City, MO, May 2018, pp. 16.
[194] Myerson, R. B., “Optimal auction design,” Mathematics of Operations Research, vol. 6, no. 1, pp. 5873, Feb. 1981.
[195] Kawaguchi, K., “Deep learning without poor local minima,” in Advances in Neural Information Processing Systems, Barcelona, Spain, Dec. 2016, pp. 586594.
[196] Chen, Y., “Banking panics: The role of the first-come, first-served rule and information externalities,” Journal of Political Economy, vol. 107, no. 5, pp. 946968, Oct. 1999.
[197] McAfee, R. P. and McMillan, J., “Auctions and bidding,” Journal of Economic Literature, vol. 25, no. 2, pp. 699738, June 1987.
[198] Gizelis, C. A. and Vergados, D. D., “A survey of pricing schemes in wireless networks,” IEEE Communications Surveys & Tutorials, vol. 13, no. 1, pp. 126145, July 2010.
[199] Parsons, S., Rodriguez-Aguilar, J. A., and Klein, M., “Auctions and bidding: A guide for computer scientists,” ACM Computing Surveys (CSUR), vol. 43, no. 2, p. 10, Jan. 2011.
[200] Koutsopoulos, I. and Iosifidis, G., “Auction mechanisms for network resource allocation,” in International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Avignon, France, May 2010, pp. 554563.
[201] Zhang, R., Song, L., Han, Z., and Jiao, B., “Ascending clock auction for physical layer security,” in Physical Layer Security in Wireless Communications. Boca Raton, FL: CRC Press, 2016, pp. 223249.
[202] Mochón, A., Sáez, Y., et al., Understanding Auctions. Basel, Switzerland: Springer, 2015.
[203] Goeree, J. K., “Bidding for the future: Signaling in auctions with an aftermarket,” Journal of Economic Theory, vol. 108, no. 2, pp. 345364, Feb. 2003.
[204] Wang, X., Li, Z., Xu, P., Xu, Y., Gao, X., and Chen, H.-H., “Spectrum sharing in cognitive radio networksan auction-based approach,” IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 40, no. 3, pp. 587596, Dec. 2010.
[205] Mochaourab, R., Holfeld, B., and Wirth, T., “Distributed channel assignment in cognitive radio networks: Stable matching and Walrasian equilibrium,” IEEE Transactions on Wireless Communications, vol. 14, no. 7, pp. 39243936, July 2015.
[206] Gul, F. and Stacchetti, E., “Walrasian equilibrium with gross substitutes,” Journal of Economic Theory, vol. 87, no. 1, pp. 95124, July 1999.
[207] Kuhn, H. W., “The Hungarian method for the assignment problem,” Naval Research Logistics (NRL), vol. 2, no. 1–2, pp. 8397, Mar. 1955.
[208] Reidt, S., Srivatsa, M., and Balfe, S., “The fable of the bees: Incentivizing robust revocation decision making in ad hoc networks,” in The 16th ACM Conference on Computer and Communications Security, Chicago, IL, Nov. 2009, pp. 291302.
[209] Lima, C. and De Abreu, G. T. F., “Game-theoretical relay selection strategy for geographic routing in multi-hop WSNs,” in IEEE 5th Workshop on Positioning, Navigation and Communication, Hannover, Germany, Mar. 2008, pp. 277283.
[210] Rodriguez, V. and Jondral, F., “Simple adaptively-prioritised spatially-reusable medium access control through the dutch auction: Qualitative analysis, issues, challenges,” in IEEE Symposium on Communications and Vehicular Technology, Delft, Netherlands, Nov. 2007, pp. 15.
[211] Cassady, R., Auctions and Auctioneering. Oakland: University of California Press, 1967.
[212] Lee, J.-S. and Hoh, B., “Sell your experiences: A market mechanism based incentive for participatory sensing,” in IEEE International Conference on Pervasive Computing and Communications (PerCom), Mannheim, Germany, Mar. 2010, pp. 6068.
[213] Edalat, N., Xiao, W., Tham, C. K., Keikha, E., and Ong, L. L., “A price-based adaptive task allocation for wireless sensor network,” in IEEE 6th International Conference on Mobile Ad Hoc and Sensor Systems, Macau, China, Oct. 2009, pp. 888893.
[214] Liu, Q., Xian, X., and Wu, T., “Game theoretic approach in routing protocol for cooperative wireless sensor networks,” in International Conference in Swarm Intelligence, Chongqing, China, June, 2011, pp. 207217.
[215] Mobile, W., “Real-time maps and traffic information based on the wisdom of the crowd.” Available: http://solsie.com/2009/09/real-time-maps-and-traffic-information-based-on-thewisdom-of-the-crowd/
[216] Liu, C. H., Hui, P., Branch, J. W., Bisdikian, C., and Yang, B., “Efficient network management for context-aware participatory sensing,” in SECON, Salt Lake City, UT, June 2011, pp. 116124.
[217] Tian, Y., Gu, Y., Ekici, E., and Özgüner, F., “Dynamic critical-path task mapping and scheduling for collaborative in-network processing in multi-hop wireless sensor networks,” in International Conference on Parallel Processing Workshops, Columbus, OH, Aug. 2006, pp. 215222.
[218] Wang, Y., Attebury, G., and Ramamurthy, B., “A survey of security issues in wireless sensor networks,” IEEE Communications Surveys and Tutorials, vol. 8, no. 2, pp. 223, 2006.
[219] Buchegger, S. and Le Boudec, J. Y., “Performance analysis of the confidant protocol,” in Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, June 2002, pp. 226236.
[220] Bolton, G. E. and Ockenfels, A., “ERC: A theory of equity, reciprocity, and competition,” American Economic Review, vol. 90, no. 1, pp. 166193, Mar. 2000.
[221] Vickrey, W., “Counterspeculation, auctions, and competitive sealed tenders,” Journal of Finance, vol. 16, no. 1, pp. 837, Mar. 1961.
[222] Lin, W.-Y., Lin, G.-Y., and Wei, H.-Y., “Dynamic auction mechanism for cloud resource allocation,” in IEEE/ACM International Conference on Cluster, Cloud and Grid Computing. Melbourne, Australia: IEEE Computer Society, May 2010, pp. 591592.
[223] Edalat, N., Tham, C.-K., and Xiao, W., “An auction-based strategy for distributed task allocation in wireless sensor networks,” Computer Communications, vol. 35, no. 8, pp. 916928, May 2012.
[224] Di, S., Wang, C.-L., Cheng, L., and Chen, L., “Social-optimized win–win resource allocation for self-organizing cloud,” in International Conference on Cloud and Service Computing (CSC), Hong Kong, China, Dec. 2011, pp. 251258.
[225] Di, S., Wang, C.-L., Zhang, W., and Cheng, L., “Probabilistic best-fit multi-dimensional range query in self-organizing cloud,” in International Conference on Parallel Processing (ICPP), Taipei, Taiwan, Sept. 2011, pp. 763772.
[226] Pinkas, B., “Cryptographic techniques for privacy-preserving data mining,” ACM SIGKDD Explorations Newsletter, vol. 4, no. 2, pp. 1219, Dec. 2002.
[227] Stanojev, I. and Yener, A., “Improving secrecy rate via spectrum leasing for friendly jamming,” IEEE Transactions on Wireless Communications, vol. 12, no. 1, pp. 134145, Jan. 2013.
[228] Corless, R. M., Gonnet, G. H., Hare, D. E., Jeffrey, D. J., and Knuth, D. E., “On the Lambert W function,” Advances in Computational Mathematics, vol. 5, no. 1, pp. 329359, Dec. 1996.
[229] Tekin, E. and Yener, A., “The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 27352751, 2008.
[230] Osborne, M. J. and Rubinstein, A., A Course in Game Theory. Cambridge, MA: MIT Press, 1994.
[231] Wang, X., Chen, X., and Wu, W., “Towards truthful auction mechanisms for task assignment in mobile device clouds,” in IEEE INFOCOM, Atlanta, GA, May 2017, pp. 19.
[232] Ahmadi, H., Macaluso, I., Gomez, I., DaSilva, L., and Doyle, L., “Virtualization of spatial streams for enhanced spectrum sharing,” in IEEE Global Communications Conference (GLOBECOM), Washington, DC, Dec. 2016, pp. 16.
[233] Dai, J., Liu, F., Li, B., Li, B., and Liu, J., “Collaborative caching in wireless video streaming through resource auctions,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 458466, Feb. 2012.
[234] Mas-Colell, A., Whinston, M. D., Green, J. R., et al., Microeconomic Theory. New York: Oxford University Press, 1995, vol. 1.
[235] Varian, H. R. and Harris, C., “The VCG auction in theory and practice,” American Economic Review, vol. 104, no. 5, pp. 442445, May 2014.
[236] Ausubel, L. M., Milgrom, P., et al., “The lovely but lonely vickrey auction,” Combinatorial Auctions, pp. 2226, 2006.
[237] Roughgarden, T., “Algorithmic game theory,” Communications of the ACM, vol. 53, no. 7, pp. 7886, 2010.
[238] Dobzinski, S. and Nisan, N., “Mechanisms for multi-unit auctions,” Journal of Artificial Intelligence Research, vol. 37, no. 1, pp. 8598, Feb. 2010.
[239] Jia, J., Zhang, Q., Zhang, Q., and Liu, M., “Revenue generation for truthful spectrum auction in dynamic spectrum access,” in Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing. New Orleans, LA: ACM, May 2009, pp. 312.
[240] Wu, Q., Zhou, M., Zhu, Q., and Xia, Y., “VCG auction-based dynamic pricing for multigranularity service composition,” IEEE Transactions on Automation Science and Engineering, vol. 15, no. 2, pp. 796805, May 2017.
[241] Dong, M., Sun, G., Wang, X., and Zhang, Q., “Combinatorial auction with time-frequency flexibility in cognitive radio networks,” in IEEE INFOCOM, Orlando, FL, Mar. 2012, pp. 22822290.
[242] Zhu, K. and Hossain, E., “Virtualization of 5G cellular networks as a hierarchical combinatorial auction,” IEEE Transactions on Mobile Computing, vol. 15, no. 10, pp. 26402654, Oct. 2016.
[243] Xu, C., Song, L., Han, Z., Zhao, Q., Wang, X., Cheng, X., and Jiao, B., “Efficiency resource allocation for device-to-device underlay communication systems: A reverse iterative combinatorial auction based approach,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 348358, Sept. 2013.
[244] Nisan, N., “Bidding languages,” in Combinatorial auctions. Cambridge, MA: MIT Press, 2006, pp. 121.
[245] Ausubel, L., Crampton, P., and Milgrom, P., “The clock-proxy auction: A practical combinatorial auction design,” in Handbook of Spectrum Auction Design. Cambridge: Cambridge University Press, 2017, pp. 119140.
[246] Bondy, J. A., Murty, U. S. R., et al., Graph Theory with Applications. London: Springer, 1976, vol. 290.
[247] Mu’Alem, A. and Nisan, N., “Truthful approximation mechanisms for restricted combinatorial auctions,” Games and Economic Behavior, vol. 64, no. 2, pp. 612631, Nov. 2008.
[248] Pikovsky, A., “Pricing and bidding strategies in iterative combinatorial auctions,” Ph.D. dissertation, Technische Universität München, 2008.
[249] Mullen, T. and Wellman, M. P., “Market-based negotiation for digital library services,” in Second USENIX Workshop on Electronic Commerce, vol. 13, Oakland, CA, Nov. 1996, pp. 259269.
[250] Williams, S. R. and Satterthwaite, M. A., The Bayesian Theory of the k-Double Auction. London: Routledge, 2018, pp. 99–124.
[251] McAfee, R. P., “A dominant strategy double auction,” Journal of Economic Theory, vol. 56, no. 2, pp. 434450, Apr. 1992.
[252] Chen, C. and Wang, Y., “Sparc: Strategy-proof double auction for mobile participatory sensing,” in International Conference on Cloud Computing and Big Data, Fuzhou, China, Dec. 2013, pp. 133140.
[253] Yang, D., Fang, X., and Xue, G., “Truthful incentive mechanisms for k-anonymity location privacy,” in IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 29943002.
[254] Xiang, L., Sun, G., Liu, J., Wang, X., and Li, L., “A discriminatory pricing double auction for spectrum allocation,” in IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China, Apr. 2012, pp. 14731477.
[255] Jin, A.-L., Song, W., Wang, P., Niyato, D., and Ju, P., “Auction mechanisms toward efficient resource sharing for cloudlets in mobile cloud computing,” IEEE Transactions on Services Computing, vol. 9, no. 6, pp. 895909, Nov. 2016.
[256] Rabin, M. O. and Thorpe, C., “Time-lapse cryptography,” Technical Report, TR-22-06 [Online]. (2006). Available: www.eecs.harvard.edu/~cat/tlc.pdf
[257] Bellare, M., Canetti, R., and Krawczyk, H., “Keying hash functions for message authentication,” in Annual International Cryptology Conference, vol. 1109. Santa Barbara, CA: Springer, July 1996, pp. 115.
[258] Sweeney, L., “k-Anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557570, Oct. 2002.
[259] Iachello, G., Smith, I., Consolvo, S., Abowd, G. D., Hughes, J., Howard, J., Potter, F., Scott, J., Sohn, T., Hightower, J., et al., “Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service,” in International Conference on Ubiquitous Computing. Tokyo: Springer, 2005, pp. 213231.
[260] Kido, H., Yanagisawa, Y., and Satoh, T., “An anonymous communication technique using dummies for location-based services,” in International Conference on Pervasive Services, Santorini, Greece, July 2005, pp. 8897.
[261] Zhou, X. and Zheng, H., “Trust: A general framework for truthful double spectrum auctions,” in IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp. 9991007.
[262] Zhou, X., Gandhi, S., Suri, S., and Zheng, H., “eBay in the sky: Strategy-proof wireless spectrum auctions,” in Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, CA, Sept. 2008, pp. 213.
[263] Parkes, D. C., Kalagnanam, J. R., and Eso, M., “Achieving budget-balance with Vickrey-based payment schemes in exchanges,” in International Joint Conferences on Artificial Intelligence, and American Association for Artificial Intelligence, San Francisco, CA, Aug. 2001, pp. 11611168.
[264] Boutilier, C., Goldszmidt, M., and Sabata, B., “Sequential auctions for the allocation of resources with complementarities,” in IJCAI, Stockholm, Sweden, Aug. 1999, pp. 527523.
[265] Milgrom, P. R. and Weber, R. J., “A theory of auctions and competitive bidding,” Econometrica: Journal of the Econometric Society, vol. 50, no. 5, pp. 10891122, Sept. 1982.
[266] Leme, R. P., Syrgkanis, V., and Tardos, É., “Sequential auctions and externalities,” in Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, Kyoto, Japan, Jan. 2012, pp. 869886.
[267] Wang, T., Zhang, R., Song, L., Han, Z., Li, H., and Jiao, B., “Power allocation for two-way relay system based on sequential second price auction,” Wireless Personal Communications, vol. 67, no. 1, pp. 4762, Nov. 2012.
[268] Bae, J., Beigman, E., Berry, R., Honig, M. L., and Vohra, R., “On the efficiency of sequential auctions for spectrum sharing,” in International Conference on Game Theory for Networks, Istanbul, Turkey, May 2009, pp. 199205.
[269] Wang, T., Song, L., Han, Z., Zhang, J., and Zhang, X., “Dynamic resource allocation in cognitive radio two-way relay networks using sequential auctions,” in IEEE International Wireless Symposium (IWS), Beijing, China, Apr. 2013, pp. 14.
[270] Errapotu, S. M., Li, H., Yu, R., Ren, S., Pei, Q., Pan, M., and Han, Z., “Clock auction inspired privacy preserving emergency demand response in colocation data centers,” IEEE Transactions on Dependable and Secure Computing, in press.
[271] Wang, T., Song, L., Han, Z., Cheng, X., and Jiao, B., “Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,” in IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, June 2012, pp. 16831687.
[272] Wang, A., Cai, Y., Guan, X., and Wang, S., “Physical layer security for multiuser two-way relay using distributed auction game,” in International Conference on Information Science and Technology (ICIST), Yangzhou, China, Mar. 2013, pp. 12021207.
[273] Zhang, R., Song, L., Han, Z., and Jiao, B., “Improve physical layer security in cooperative wireless network using distributed auction games,” in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Shanghai, China, June 2011, pp. 1823.
[274] Ausubel, L. M., “An efficient ascending-bid auction for multiple objects,” American Economic Review, vol. 94, no. 5, pp. 14521475, Dec. 2004.
[275] Huang, J., Han, Z., Chiang, M., and Poor, H. V., “Auction-based resource allocation for cooperative communications,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 7, pp. 12261237, Sept. 2008.
[276] Bapna, R., Goes, P., and Gupta, A., “A theoretical and empirical investigation of multi-item on-line auctions,” Information Technology and Management, vol. 1, no. 1–2, pp. 123, Jan. 2000.
[277] Karaliopoulos, M., Telelis, O., and Koutsopoulos, I., “User recruitment for mobile crowdsensing over opportunistic networks,” in IEEE Conference on Computer Communications (INFOCOM), Kowloon, Hong Kong, Apr. 2015, pp. 22542262.
[278] Wang, B. and Liu, K. R., “Advances in cognitive radio networks: A survey,” IEEE Journal of Selected Topics in Signal Processing, vol. 5, no. 1, pp. 523, Feb. 2011.
[279] Akyildiz, I. F., Lo, B. F., and Balakrishnan, R., “Cooperative spectrum sensing in cognitive radio networks: A survey,” Physical Communication, vol. 4, no. 1, pp. 4062, Mar. 2011.
[280] Shi, W., Zhang, L., Wu, C., Li, Z., and Lau, F., “An online auction framework for dynamic resource provisioning in cloud computing,” ACM SIGMETRICS Performance Evaluation Review, vol. 42, no. 1, pp. 7183, Aug. 2014.
[281] Sun, Y., Liu, F., Li, B., Li, B., and Zhang, X., “Fs2you: Peer-assisted semi-persistent online storage at a large scale,” in IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp. 873881.
[282] Davoli, A. and Mei, A., “Triton: A peer-assisted cloud storage system,” in Proceedings of the First Workshop on Principles and Practice of Eventual Consistency. Amsterdam, Netherlands: ACM, Apr. 2014, pp. 4:1–4:7.
[283] Zhao, J., Chu, X., Liu, H., Leung, Y.-W., and Li, Z., “Online procurement auctions for resource pooling in client-assisted cloud storage systems,” in IEEE Conference on Computer Communications (INFOCOM), Kowloon, China, Apr. 2015, pp. 576584.
[284] Mulder, F., van der Avoird, A., and Wormer, P. E., “Anisotropy of long range interactions between linear molecules: H2-H2 and H2-HE,” Molecular Physics, vol. 37, no. 1, pp. 159180, Aug. 1979.
[285] Gopinathan, A., Li, Z., and Wu, C., “Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets,” in IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 30203028.
[286] de Hoog, J., Alpcan, T., Brazil, M., Thomas, D. A., and Mareels, I., “A market mechanism for electric vehicle charging under network constraints,” IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 827836, Mar 2016.
[287] Holt, C. A. Jr. and Sherman, R., “Waiting-line auctions,” Journal of Political Economy, vol. 90, no. 2, pp. 280294, Apr. 1982.
[288] Wu, G., Ren, P., and Zhang, C., “A waiting-time auction based dynamic spectrum allocation algorithm in cognitive radio networks,” in IEEE Global Telecommunications Conference, Kathmandu, Nepal, Dec. 2011, pp. 15.
[289] Manelli, A. M. and Vincent, D. R., “Bundling as an optimal selling mechanism for a multiple-good monopolist,” Journal of Economic Theory, vol. 127, no. 1, pp. 135, Mar. 2006.
[290] Giannakopoulos, Y. and Koutsoupias, E., “Duality and optimality of auctions for uniform distributions,” in Proceedings of the Fifteenth ACM Conference on Economics and Computation, Palo Alto, CA, June 2014, pp. 259276.
[291] Yao, A. C.-C., “Dominant-strategy versus Bayesian multi-item auctions: Maximum revenue determination and comparison,” in Proceedings of the ACM Conference on Economics and Computation, Cambridge, MA, June 2017, pp. 320.
[292] Hornik, K., “Approximation capabilities of multilayer feedforward networks,” Neural Networks, vol. 4, no. 2, pp. 251257, Jan. 1991.
[293] Bertsekas, D. P., Constrained Optimization and Lagrange Multiplier Methods. New York: Academic Press, 2014.
[294] Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V., et al., “Blockchain technology: Beyond bitcoin,” Applied Innovation, vol. 2, no. 610, p. 71, June 2016.
[295] Bitcoin: A peer-to-peer electronic cash system [Online]. (2008). Available: https://bitcoin.org/bitcoin.pdf
[296] Xiong, Z., Zhang, Y., Niyato, D., Wang, P., and Han, Z., “When mobile blockchain meets edge computing,” IEEE Communications Magazine, vol. 56, no. 8, pp. 3339, Aug. 2018.
[297] Jiao, Y., Wang, P., Niyato, D., and Xiong, Z., “Social welfare maximization auction in edge computing resource allocation for mobile blockchain,” in 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, May 2018, pp. 16.
[298] Xiong, Z., Feng, S., Wang, W., Niyato, D., Wang, P., and Han, Z., “Cloud/fog computing resource management and pricing for blockchain networks,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 45854600, Jun. 2019.
[299] Houy, N., “The bitcoin mining game,” 2014, SSRN 2407834.
[300Online][301] . Available: www.tensorflow.org/
[302] Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C., Introduction to Algorithms. Cambridge, MA: MIT Press, 2009.
[303] Ausubel, L. M. and Cramton, P., “Vickrey auctions with reserve pricing,” Economic Theory, vol. 23, no. 3, pp. 493505, Apr. 2004.
[304] Gale, D. and Nikaido, H., “The Jacobian matrix and global univalence of mappings,” Mathematische Annalen, vol. 159, no. 2, pp. 8193, Apr. 1965.