File Transfer Application For Sharing Femto Access

被引:0
|
作者
Krichen, Mariem [1 ]
Cohen, Johanne [1 ]
Barth, Dominique [1 ]
机构
[1] Univ Versailles, PRiSM, 45 Ave Etats Unis, F-78035 Versailles, France
关键词
Component: game theory; Sharing femto access; Nash Equilibrium; Distributed learning algorithm;
D O I
10.1007/978-1-4471-2155-8_24
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In wireless access network optimization, today's main challenges reside in traffic offload and in the improvement of both capacity and coverage networks. The operators are interested in solving their capacity problems in areas where the macro network signal is not able to serve the demand for mobile data. Thus, the major issue for operators is to find the best solution at reasonable expanses. The femto cell seems to be the answer to this problematic. In this work, we focus on sharing femto access between a same mobile operator's customers. This problem is modeled as a game where service requesters customers (SRCs) and service providers customers (SPCs) are the players. This article considers one SPC. SRCs are static and have some similar and regular connection behavior. Moreover, the SPC and each SRC have a software embedded respectively on its femto access, user equipment. After each SRC's connection request, its software will learn the strategy increasing its gain using local information. We present a distributed learning algorithm with incomplete information running in SRCs software. This work answers these questions: Does the distributed algorithm converge to a stable state? If yes, does this state a Nash Equilibrium and how many iterations we need to reach it?
引用
收藏
页码:191 / 198
页数:8
相关论文
共 50 条
  • [21] IMPLEMENTATION OF SECURITY FUNCTIONS INTO FILE TRANSFER, ACCESS AND MANAGEMENT PROTOCOL
    CHANG, H
    MONKEWICH, O
    MCCRUM, WA
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 547 - 553
  • [22] Minimizing File Transfer Time in Opportunistic Spectrum Access Model
    Hu, Jie
    Doshi, Vishwaraj
    Eun, Do Young
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (01) : 630 - 644
  • [23] BEYOND FILE SHARING
    RASH, W
    BYTE, 1991, 16 (13): : 103 - 108
  • [24] File sharing madness
    Feldman, Jonathan
    Network Magazine, 2004, 19 (11): : 41 - 44
  • [25] Security access model of P2P file-sharing system
    Wang, Jinsong
    Wang, Ning
    Liu, Weiwei
    Wu, GongYi
    DCABES 2007 Proceedings, Vols I and II, 2007, : 544 - 547
  • [26] Research on Sharing Access and Performance Improvement Based on User-Space File System
    Yang H.
    Yang Y.
    Sun G.
    Yang, Yahui (yhyang@ss.pku.edu.cn), 1600, Peking University (56): : 1020 - 1030
  • [27] ENTERPRISE FILE-SHARING SYSTEM WITH LIGHTWEIGHT ATTRIBUTE-BASED ACCESS CONTROL
    Xiong, Zhi
    Guo, Ting
    Zhu, Changsheng
    Cai, Weihong
    Cai, Lingru
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2018, 80 (01): : 15 - 26
  • [28] Safe and Easy Access to a Computer File-Sharing Program Laboratory Practice and Research
    Wei, Lishuang
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 373 - 377
  • [29] HP MAP 3.0 FILE TRANSFER, ACCESS, AND MANAGEMENT-800
    MANWEILER, SW
    HEWLETT-PACKARD JOURNAL, 1990, 41 (04): : 24 - 30
  • [30] Maximizing P2P File Access Availability in Mobile AdHoc Networks though Replication for Efficient File Sharing
    Pirjade, Shabana
    Burghate, Rakhi R.
    Ghogare, Prachi G.
    Ghotkule, Ashwini
    Jatade, Jyoti
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1434 - 1438