Loading [MathJax]/extensions/MathZoom.js
IEEE Xplore Search Results

Showing 1-25 of 4,400 resultsfor

Results

Contract design is a significant topic in exchange governance at all time. More complete contracts mitigate ex post opportunism and the associated distortions in unobservable investment, but at the cost of additional resources expended in ex ante design. In construction exchanges, the question that the contracting parties must face is how to design an optimally contractual incomplete arrangements ...Show More
The latest trends in spectrum trading allow secondary users (SUs) to employ hybrid access models and exploit bandwidth employing either opportunistic spectrum access or exclusive spectrum access of vacant frequency bands (FBs) leased for exclusive usage. In this paper, the spectrum trading problem is addressed in an operational framework, where a primary spectrum owner (PSO) allocates specific FBs...Show More
Proper risk allocation (RA) can promote project management performance by means of contract clauses, but the existing researches were mainly on the philosophy of one-time and static RA, which hindered the project management performance improvement persistently. On the basis of literature review, the paper pointed out the characteristic of dynamic RA , and further analyzed the RA contract clauses o...Show More
Providing economic incentives to all parties involved is essential for the success of dynamic spectrum access. Cooperative spectrum sharing is one effective way to achieve this, where secondary users (SUs) relay traffics for primary users (PUs) in exchange for dedicated spectrum access time for SUs' own communications. In this paper, we study the cooperative spectrum sharing under incomplete infor...Show More
Internet of Things (IoT) devices operate in an untrusted environment, and blockchain technology can provide a secure distributed collaboration method. However, the widespread distribution of heterogeneous devices in the IoT creates complex information asymmetry issues, leading to inefficient resource allocation. This is especially true when information asymmetry occurs in long-term cooperative rel...Show More
Bilateral contracts are widely applied in competitive electricity markets. Contract parties should distribute electricity deliveries by time intervals during a contract period in an optimal way to get the highest profit and to elaborate a strategy of participating in the spot and retail markets. The statement of the stochastic optimization problems is presented for delivery scheduling. Game theory...Show More
Development of dynamic spectrum access and allocation techniques recently have made feasible the vision of cognitive radio systems. However, a fundamental question arises: Why would licensed primary users of a spectrum band allow secondary users to share the band and degrade performance for them? And how can we design incentive schemes to enable spectrum sharing using cooperative communication sch...Show More
A series of economic game experiments have been proving that most people are not only self-interest but also inequity averse, and hereby will suffer disutility in the face of any unfair allocation. However, the standard contract theory, which accepts the traditional economic assumption of self-interest, has ignored inequity aversion. In this paper, by incorporating the inequity aversion into the s...Show More
Device-to-device (D2D) communication is viewed as one promising technology for boosting the capacity of wireless networks and the efficiency of resource management. D2D communication heavily depends on the participation of users in sharing contents. Thus, it is imperative to introduce new incentive mechanisms to motivate such user involvement. In this paper, a contract-theoretic approach is propos...Show More
The last decade has been unstable for the Information Technology (IT) professional. In the early millennium, an increased demand for ecommerce systems appeared in part because of increased use of information and communication technologies (ICT). However, the dotcom bust, the 2001 and 2007 recessions have created an increase concern on IT spending. Organizations have reduced not only IT purchases b...Show More
Different regulatory frameworks have implemented competitive mechanisms to increase efficiency in transmission, a natural monopoly. Conflicts of interest and hidden costs make necessary to define methods to obtain an appropriate valuation of new transmission assets. This paper is the first one of a two-paper series and presents the fundamentals of transmission project valuation and cost allocation...Show More
The problem of quantity flexibility contract design is studied in the setting that the downstream retailer's marginal cost is his private information. In a two stage supply chain system which contains a single supplier and a single retailer, the distortion of low cost retailer's order quantity and the impact on profit of the supply chain caused by asymmetric information are analyzed using the anal...Show More
This paper investigates the integration of blockchain technology and game theory within the context of distributed energy generation. Using a Cournot game model to simulate electricity trading with mergers, the study provides valuable insights into market dynamics and participant strategies. To guide both researchers and practitioners, a structured model for the smart contract process is introduce...Show More
This paper develops a method for price limits setting in futures market consistent with self-enforcing contract theory that price limits, in conjunction with margin, ought to provide help for futures contract enforcement. We investigate the distribution of return for SHFE natural rubber futures contract and find a characteristic of heavy-tailedness. Thus, we modify the assumption of normal distrib...Show More
Lack of corporate environmental responsibility will bring serious obstacles to the economy's sustainable development. This paper analyzes why internal and external factor analysis, the traditional contract theory fail to explain the reasons thoroughly, and uses NPV model to show the feasibility of corporate environmental responsibility. Under the view of integrative social contracts theory (ISCT),...Show More
The ever increasing need for energy efficient systems has led to various ingenious ideas about energy management. A major offshoot of this search for energy efficient solutions is demand management in power systems. The goal of any demand management program is to control the demand for electric power among customers thereby creating load relief for electric utilities and improving system security....Show More
Unmanned aerial vehicles (UAVs) equipped with high definition (HD) cameras, intelligent sensors, computing, and communication modules can be deployed to execute crowdsensing tasks by leveraging federated learning (FL), e.g., air quality perception and ground target detection. FL can reduce transmission stress and protect data privacy when training models, which is suitable for resource constrained...Show More
The fusion of the Internet of Things (IoT) with sixth-generation (6G) technology has significant potential to revolutionize the IoT landscape. With the ultrareliable and low-latency communication capabilities of 6G, 6G-IoT networks can transmit high-quality and diverse data to enhance edge learning. Artificial intelligence-generated content (AIGC) harnesses advanced artificial intelligence (AI) al...Show More
Maintenance subcontracting has been widely implemented. The owner of equipment hires an agent to perform maintenance actions with a predetermined availability target to be met. The traditional payment scheme such as a fixed price, a cost reimbursement is effective only to ensure the achievement of the availability target. However, there are circumstances where pushing the agent to exceed the targe...Show More
In the emerging cooperative non-orthogonal multiple access (NOMA) systems, an important design issue is to incentivize mobile relays (MRs) to participate in the cooperative process and achieve a win-win situation to both the base station (BS) and MRs under asymmetric information, where the BS does not know the channel state information of MRs and NOMA users. As a promising remedy, we apply the adv...Show More
Traffic offloading in a two-tier heterogeneous network is a highly efficient approach to relieve the network over-crowding caused by rapidly rising requests for traffic. However, the inevitable delay caused by the intermittent and opportunistic traffic offloading may degenerate the experience of the consumer, which makes consumers reluctant to participate in it. Moreover, due to the unsteadiness o...Show More
Backscatter communication has been acknowledged as an essential supplement to improve the performance of radio-frequency-powered networks. Considering the fact that the backscatter communication needs the cooperation from the secondary gateway, pricing is an effective method to incentivize the secondary gateway to take part in the backscatter communication. In this letter, we consider a practical ...Show More
Participatory sensing is the concept of recruiting mobile devices to collect data and engage computing. However, there are many problems in this mode of cooperation, poor quality of received information caused by task executors has been one of them. So incentive mechanism is proposed for attracting users to participate in and submit high-quality data. Inspired by contract theory, we model particip...Show More
Wireless energy transfer has been recently viewed as a promising solution to extend the operation time of wireless devices (e.g., sensors) for Internet of Things (IoT) system. In this paper, we formulate a business model and use the contract approach to study the energy transfer and pricing issue in IoT system, where the energy access point (EAP) gains revenue from providing wireless energy transf...Show More
Based on Complete and Incomplete Contract Theory, the paper analyzes the root causes of different kinds of problems during the process of budget compilation and implementation of university research funds. These problems include false budget, fiddling on expenditure, and hard to monitor and control. Based on these analyses, the paper also provides corresponding strategy. The analysis in the paper ...Show More