File Transfer Application For Sharing Femto Access

被引:0
|
作者
Krichen, Mariem [1 ]
Cohen, Johanne [1 ]
Barth, Dominique [1 ]
机构
[1] Univ Versailles, PRiSM, 45 Ave Etats Unis, F-78035 Versailles, France
关键词
Component: game theory; Sharing femto access; Nash Equilibrium; Distributed learning algorithm;
D O I
10.1007/978-1-4471-2155-8_24
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In wireless access network optimization, today's main challenges reside in traffic offload and in the improvement of both capacity and coverage networks. The operators are interested in solving their capacity problems in areas where the macro network signal is not able to serve the demand for mobile data. Thus, the major issue for operators is to find the best solution at reasonable expanses. The femto cell seems to be the answer to this problematic. In this work, we focus on sharing femto access between a same mobile operator's customers. This problem is modeled as a game where service requesters customers (SRCs) and service providers customers (SPCs) are the players. This article considers one SPC. SRCs are static and have some similar and regular connection behavior. Moreover, the SPC and each SRC have a software embedded respectively on its femto access, user equipment. After each SRC's connection request, its software will learn the strategy increasing its gain using local information. We present a distributed learning algorithm with incomplete information running in SRCs software. This work answers these questions: Does the distributed algorithm converge to a stable state? If yes, does this state a Nash Equilibrium and how many iterations we need to reach it?
引用
收藏
页码:191 / 198
页数:8
相关论文
共 50 条
  • [41] DIRECT ACCESS FILE
    MENDELSON, H
    YECHIALI, U
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1986, 12 (01): : 67 - 67
  • [42] On Unstructured File Sharing Networks
    Zhang, Honggang
    Neglia, Giovanni
    Towsley, Don
    Lo Presti, Giuseppe
    INFOCOM 2007, VOLS 1-5, 2007, : 2189 - +
  • [43] 'Random Access File'
    Haag, S
    CANADIAN LITERATURE, 1997, (155): : 194 - 197
  • [44] Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization
    Chen, E.
    Zhu, Yan
    Liang, Kaitai
    Yin, Hongjian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 579 - 594
  • [45] A Sensitive File Abnormal Access Detection Method Based on Application Classification
    Liu, Hui
    Xue, Hanxing
    Lu, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [46] Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
    Chen, Kang
    Shen, Haiying
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (04) : 1029 - 1042
  • [47] Data exchange: File transfer, transaction processing and application interoperability
    Arnold, JA
    Teicholz, P
    COMPUTING IN CIVIL ENGINEERING, 1996, : 438 - 444
  • [48] Data exchange: File transfer, transaction processing and application interoperability
    Arnold, James Andrew
    Teicholz, Paul
    Computing in Civil Engineering (New York), 1996, : 438 - 444
  • [49] Modelling of SACK TCP and application to the HTTP file transfer environment
    Phillips, D
    Hu, JK
    LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 515 - 516
  • [50] STATE COMPETENCES AND CONFLICTS WITH THE LOCAL ADMINISTRATION IN THE RIGHT OF ACCESS AND TRANSFER OF FILE RECORDS
    Sanchez Sanchez, Zulima
    REVISTA GENERAL DE DERECHO ADMINISTRATIVO, 2011, (28):