The evolution of computing is characterized by decentralization and decreasing institutional control over resources. Wireless Grids, that is, fixed and mobile ad-hoc resource sharing networks, are challenging environments in which users strategic behaviors are crucial to system performance. We review the mechanisms employed to regulate strategic behavior online-technical, social, legal and economic-and discuss trends in their operation and application in distributed wireless grid computing.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In the Tenth International Conference on Information and Knowledge Management, 2001.
R. Anderson. Trusted computing FAQ. http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html, 2003.
D. Anius. Enhancing innovation within a regional wireless grid. In The Inter-national Conference on Computer, Communication and Control Technologies, Orlando, Florida, 2003.
F. Baker, B. Foster, and C. Sharp. Cisco architecture for lawful intercept in IP networks, Internet Draft (Informational). Technical report, IETF, 2003.
P. A. Branch. Lawful interception of the internet. Technical report, Centre for Advanced Internet Architectures, 2003.
L. Buttyán and J. -P. Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications, 83(5):589-592, 2003.
R. Buyya, H. Stockinger, J. Giddy, and D. Abramson. Economic models for management of resources in peer-to-peer and grid computing. In the SPIE Inter-national Conference on Commercial Applications for High-Performance Com-puting, Denver, USA, 2001.
B. Chen and C. H. Chang. Mobility impact on energy conservation of ad hoc routing protocols. In International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet, L’Aquila, Italy, 2003.
D. Clark. The design philosophy of the darpa internet protocols. In SIG-COMM ’88: Symposium proceedings on Communications architectures and pro-tocols, pages 106-114, New York, NY, USA, 1988. ACM Press.
B. Cohen. Incentives build robustness in bittorrent. In Workshop on Economics of Peer-to-Peer Systems, 2003.
R. Conte and C. Castelfranchi. Cognitive and Social Action. UCL Press, 1995.
J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring. Modelling incentives for collaboration in mobile ad hoc networks. In WiOpt ’03, 2003.
E. Drexler and M. Miller. Ecology of Computation, chapter Incentive engineering for computational resource management. Elsevier Science Publishers B. V., 1988.
Foster, C. Kesselman, J. Nick, and S. Tuecke. The physiology of the grid: An open grid services architecture for distributed systems integration. citeseer. nj. nec. com/foster02physiology. html, 2002.
Ian Foster, Carl Kesselman, and Steven Tuecke. The anatomy of the grid: Enabling scalable virtual organizations. Int. J. High Perform. Comput. Appl., 15(3):200-222, 2001.
E. Friedman and D. Parkes. Pricing wifi at starbucks -issues in online mechanism design. In Fourth ACM Conf. on Elec. Commerce, 2003.
M. Gaynor, S. L. Moulton, M. Welsh, E. LaCombe, A. Rowan, and J Wynne. Integrating wireless sensor networks with the grid. IEEE Internet Computing, 8(4):32-39, 2004.
M. Gaynor, L. W. McKnight, J. Hwang, and J. Freedman. Wireless grid networks and virtual markets. In the International Conference on Computer, Communi-cation and Control Technologies, 2003.
J. Gomoluch and M. Schroeder. Market-based resource allocation for grid com-puting: A model and simulation. In 1st International Workshop on Middleware for Grid Computing, Rio de Janeiro, Brazil, 2003.
J. Hwang and P. Aravamudham. Proxy-based middleware services for peer-to-peer computing in virtually clustered wireless grid networks. In the International Conference on Computer, Communication and Control Technologies, Orlando, Florida, 2003.
Junseok Hwang and P. Aravamudham. Middleware services for P2P computing in wireless grid networks. IEEE Internet Computing, 8(4):40-46, 2004.
IESG IAB. IETF policy on wiretapping. Technical Report RFC 2804, IETF, 2000.
R. Jurca and B. Faltings. An incentive compatible reputation mechanism. In the IEEE Conference on E-Commerce, Newport Beach, CA, USA, 2003.
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In the Twelfth International World Wide Web Conference, 2003.
T. F. Kompas. Traditional notions of equilibrium reconsidered. Equilibrium, 11:484-495, 2000.
W. Lehr. Standardization: Understanding the process. Journal of the American Society for Information Science, 43(8):550-555, 1992.
L. Lessig. Code and Other Laws of Cyberspace. Basic Books, 1999.
J. MacKie-Mason, S. Shenker, and H. Varian. Network architecture and content provision: An economic analysis. Telecommunications Policy, 20(3):203-217, 1996.
T. W. Malone, J. Yates, and R. I. Benjamin. Electronic markets and electronic hierarchies. Communications of the ACM, 30(6):484-497, 1987.
D. McCullagh. Inside Cisco’s eavesdropping apparatus. http://news. com. com/ 2010-1071-997528. html, 2003.
L. W. McKnight, D. Anius, and O. Uzuner. Virtual markets in wireless grids: Peering policy obstacles. In Proceedings of the International Conference on Computer, Communication and Control Technologies, 2003.
L. W. McKnight and J. Howison. Towards a sharing protocol for wireless grids. In Proceedings of the International Conference on Computer, Communication and Control Technologies, 2003.
L. W. McKnight and W. Lehr. Show me the money: Agents and contracts in service level agreement markets. INFO, 40(2):24-36, 2002.
L. W. McKnight, P. M. Vaaler, and R. L. Katz. Creative destruction: business survival strategies in the global Internet economy. MIT Press, 2001.
Lee McKnight. Wireless Grids-Distributed Resource Sharing by Mobile, Nomadic, and Fixed Devices. IEEE Internet Computing, 8(4):2-10, 2004.
L. W. McKnight, R. Sharif, and L. van de Wijngaert. Wireless Grids:Assessing a New Technology from a User Perspective, pages 169-182. Springer, 2005.
W. McKnight, D. Anius, and O. Uzuner. Internet Services. Quality of Service in Grids, Networks and Markets. In press.
N. Miller, P. Resnick, and R. Zeckhauser. Eliciting honest feedback in electronic markets. In Working Paper for the SITE02 workshop, 2003.
T. Moreton and A. Twigg. Trading in trust, tokens and stamps. In 1st Workshop on the Economics of P2P systems, Cambridge University, 2003.
L. Mui, M. Mohtashemi, and A. Halberstadt. Notions of reputation in multi-agents systems: a review. In the first international joint conference on Au-tonomous agents and multiagent systems, 2002.
W. R. Neuman, L. W. McKnight, and R. J. Solomon. The Gordian Knot: Political Gridlock on the Information Highway. MIT Press, 1997.
C. Ng, D. Parkes, and M. Seltzer. Strategyproof computing: Systems infrastruc-tures for self-interested parties. In 1st Workshop on the Economics of P2P systems, 2003.
Odlyzko. Internet pricing and the history of communications. Computer Networks, 36(5-6):493-517, 2001.
J. S. Park, A. Nanda, and J. Howison. Security challenges and countermeasures in wlans. In the International Conference on Computer, Communication and Control Technologies, Orlando, Florida, 2003.
D. C. Parkes. Iterative combinatorial auctions: Achieving economic and com-putational efficiency. Technical report, University of Pennsylvania, 2001.
D. Reed, J. Saltzer, and D. Clark. Active networking and end-to-end arguments. IEEE Network, 12(3):67-71, 1998.
P. Resnick and C. Dellarocas. Online Reputation Mechanisms: A Roadmap for Future Research. Technical report, First Interdisciplinary Symposium on Online Reputation Mechanisms, 2006.
P. Resnick and R. Zeckhauser. Trust among strangers in internet transactions: Empirical analysis of ebay’s reputation system. Advances in Applied Microeco-nomics, Elsevier Science, 11, 2003.
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems: Facilitating trust in internet interactions. Communications of the ACM, 43(12):45-48, 2000.
P. Resnick, R. Zeckhauser, J. Swanson, and K. Lockwood. The value of reputa-tion on ebay: A controlled experiment. Technical report, School of Information, University of Michigan, 2002.
J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems, 2(4):277-288, 1984.
S. E. Schecter, R. A. Greenstadt, and M. D. Smith. Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment. In The Second Workshop on Economics and Information Security, 2003.
S. Shenker, D. Clark, D. Estrin, and S. Herzog. Pricing in computer networks: Reshaping the research agenda. ACM Computer Communication Review, 26(6):19-43, 1996.
J. Shneidman and D. Parkes. Rationality and self-interest in peer to peer net-works. In Proceedings of the 2nd International Workshop on Peer-to-Peer Sys-tems, 2003.
B. Strulo, J. Farr, and A. Smith. Securing mobile ad hoc networks -a motiva-tional approach. BT Technology Journal, 21(3):81-89, 2003.
Sutherland. A futures market in computer time. Communications of the ACM, 11(6):449-451, 1968.
O. Uzuner and R. Davis. Digital fingerprinting for distribution volume track-ing:intellectual property protection in wireless grids. In the International Conference on Computer, Communication and Control Technologies, Orlando, Florida, 2003.
H. R. Varian. Economic mechanism design for computerized agents. In Workshop on Electronic Commerce, 2000.
C. A. Waldspurger, T. Hogg, B. A. Huberman, J. O. Kephart, and W. S. Stornetta. Spawn: A distributed computational economy. Software Engineering, 18(2):103-117, 1992.
C. J. Woodard and D. C. Parkes. Strategyproof mechanisms for ad hoc network formation. In 1st Workshop on the Economics of P2P systems, 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer
About this chapter
Cite this chapter
McKnight, L.W., Lehr, W., Howison, J. (2007). Coordinating User and Device Behavior in Wireless Grids. In: Fitzek, F.H.P., Katz, M.D. (eds) Cognitive Wireless Networks. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-5979-7_35
Download citation
DOI: https://doi.org/10.1007/978-1-4020-5979-7_35
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-5978-0
Online ISBN: 978-1-4020-5979-7
eBook Packages: EngineeringEngineering (R0)