1 / 70

Bartering for Collaborative Exchange of Digital Goods in Pervasive Environments

This research proposal explores the use of bartering as an effective mechanism to incentivize collaboration and improve the quality of collaborations in pervasive environments. It investigates the challenges of collaboration in such environments and proposes a value-based approach to bartering for digital goods and services.

ndora
Télécharger la présentation

Bartering for Collaborative Exchange of Digital Goods in Pervasive Environments

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. V8

  2. Semi Automated Bartering of Digital Goods and Services in Pervasive Environments Olga Ratsimor Doctoral Research Proposal October 25 2005

  3. Presentation Outline INTRO • Introduction • Thesis Statement • Motivation • Proposed Approach • Research Contributions • Research Plan & TimeLine • Preliminary Work • Related Work • Summary and Q&A

  4. Pervasive Computing Vision INTRO

  5. Issues Affecting Collaboration INTRO • No incentive for collaborations • Self-interested personal mobile devices have limited resources • Free Rider Problems in Pervasive Environments • In attempt to conserve its computing resources and power, device drops service requests and other communications from other devices while sending out service discovery requests for its own benefit. • Information Noise Makers and Spammers: • Spamming and other heavy communication services. • Devices must be capable of filtering out “noise“ still being able to collect useful information and discover needed services.

  6. Environmental Limitations INTRO • Quality of Services is Unpredictable: • Received goods and services may not be what originally was expected. • Utility function various on perceived context, time, location, etc. • Inefficient Storage of Context Specific Services: • Many of the services are very context specific and are used only during a particular context. • When the user changes context, unused services continue to take up space and resources on the devices.

  7. Hypothesis Statement HS The Question : Considering the diversity and the personal nature of devices participating in pervasive environments, is the current model of altruistic ad hoc collaborations still the most effective model to motivate collaborations? The Hypothesis: Bartering can be an effective mechanism to incentivize devices to collaborate and improve the quality of collaborations. The Proposed Approach: • Incentive driven collaboration mechanisms • Communication model based on bartering • Value based view of electronic goods and services

  8. Presentation Outline MOTIV • Introduction • Thesis Statement • Motivation • Proposed Approach • Research Contributions • Research Plan & TimeLine • Preliminary Work • Related Work • Summary and Q&A

  9. D1 Has: RingTone-B, C, D Wants: Song-A D2 D3 Has: Wallpaper-A, Song-A RingTone-B,C Wants: ScreenSaver-A Wallpaper-B Has: Map-A, Song-A Wants: RingTone-B D5 D4 Has: ScreenSaver-A, B Wants: RingTone-A Has: Map-A, RingTone-A,C Wants: RingTone-B Basic Scenario - 1 MOTIV

  10. D1 Has: RingTone-B, C, D Wants: Song-A D2 D3 Has: Wallpaper-A, Song-A RingTone-B,C Wants: ScreenSaver-A Wallpaper-B Has: Map-A, Song-A Wants: RingTone-B D5 D4 Has: ScreenSaver-A, B Wants: RingTone-A Has: Map-A, RingTone-A,C Wants: RingTone-B Counter ProposalScenario - 2 MOTIV

  11. D1 Has: RingTone-B, C, D Wants: Song-A D2 D3 Has: Wallpaper-A, Song-A RingTone-B,C Wants: ScreenSaver-A Wallpaper-B Has: Map-A, Song-A Wants: RingTone-B D5 D4 Has: ScreenSaver-A, B Wants: RingTone-A Has: Map-A, RingTone-A,C Wants: RingTone-B Relationship Scenario - 3 MOTIV

  12. Has: RingTone-A Wants: RingTone-B Later Has: RingTone-A, B Wants: Song-A Has: Song-A Wants: RingTone-A, B Investment Scenario - 4 MOTIV D1 D2 Has: RingTone-B Wants: Song-A D2 D3

  13. Has: RingTone-A, C Wants: Song-B Has: Song-A Wants: RingTone-B D1 D2 Has:RingTone-A Length= 10sec Type= monophonic Style=dance RingTone-C Length= 5sec Type= polyphonic Style=dance Wants: Song-* Performer= singer-A Has: Song-A Title=title-A Performer= singer-A Style=pop Wants: RingTone-* Type= polyphonic Length > 8sec D1 D2 SimilarityScenario 5 MOTIV

  14. Domain – What are Goods… MOTIV • Digital Goods • Ring Tones, MP3s, Podcasts, Mobile Games, Screen Savers, Wallpaper, Video and Coupons • Low Cost Items • Replicable • Digital Rights Management (DRM) • transfer of ownership • Digital Goods are obtained • for personal use • to be used as token in future bartering

  15. Double Coincidence of Wants MOTIV • A barter exchange requires a double coincidence of wants for trade to take place: “An exchange between two parties can only occur if both parties desire what the other is willing to give up” • The probability that one person has what the other desires is not in our favor. • Our model relaxes the constraint • Improves the participation and tolerance levels

  16. What is Needed? MOTIV We need to develop: • Define and use Bartering protocols that are aware of personal relationships between the devices and their users’ perceived value of electronic goods and services. • Valuation of electronic goods and services in personalized context conscious manner.

  17. Presentation Outline • Introduction • Thesis Statement • Motivation • Proposed Approach • Research Contributions • Research Plan & TimeLine • Preliminary Work • Related Work • Summary and Q&A

  18. Bartering Model • Context-based, continuous bartering with peers in pervasive environments • In order to barter, one has to understand what the items are worth and how much they are worth. • One also wants to evaluate who s/he is dealing with. • Difference between community and anonymous P2P network

  19. Perceived Value • Value in Use - is the value of the particular electronic good or service for the particular user. • Value in Exchange - reflects the potential value of the service against any other service in value-for-value exchanges.

  20. Aspects of Value • Systemic Valuerepresents the essence of the digital goods and services • Liquidity reflects the ease with which a service can be acquired or exchanged for any service without a significant loss in value. • Simplicity and similar value are the key factors. • A service is highlyliquid if it can be exchanged frequently by many devices for services of a similar value. • Services with higher liquidity index would be in greater demand in the computing environment and could be used by devicesas exchange tokens.

  21. Aspects of Value • Context Based Valueis the value that describes importance of the service or information in a particular context. • Original Cost of the service or information reflects resources or money that had to be spent to initially acquire the services. • Historic Value refers to the historic recorded value for the service of information. • Original Value

  22. Aspects of Value • Store of Value refers to how consistently can the service store its value. Services and information value can depreciate or appreciate over time. • Depreciation over time • expiration time and date • limit on replication. • Appreciation over time • Memorabilia • Transaction Costdescribes costs involved in searching, bargaining and transferring data and verifying the correctness and finalization of transaction. • Service Maintenance Cost describes the costs associated with keeping the service up to date. • Frequency of Use Valuation - service that is frequently used have greater value

  23. Aspects of Value • Attribute Based Valuationattributesof the servicehave a value function that represents the importance of the attribute. • Composability Index (*) reflects on how many other services can a particular service be composed with. “Handy component” • Value in exchange - composabilityindex is proportional to the number of the services on in the environment that could be composed with a particular service. • Services with high composabilityindex would be in greater demand in the computing environment. * Looking for input on better definition and terminology.

  24. Value in Use

  25. Value in Exchange

  26. Relationships • Exploit relationships between groups of devices • Self Devices - are personal devices that belong to a single user. • Sibling Devices - are devices of users that are very close. • Friendly Devices - are devices that belong to the different users that frequently come in contact and collaborate with one another. • Strangers Devices- are devices that just meet and are most likely will never come in contact again. • Siblingsand Strangersare special cases of friendliness. • Unfriendly Devices- are devices that are actively uncooperative • Trust could also be used to determine the level of cooperation • Other Social Networks • Linked In & Orkut

  27. iHave pHave iWant Bartering Protocol Each platform has three lists • pHave– list of goods and services that device has but keeps private • iWant– list of goods and services that device desires and is actively searching for • iHave – list of goods and services that device is willing to exchange for other services

  28. iHave pHave iWant Bartering Protocol iWant List and iHave List will contain value based descriptions of each goods and services • Value in Use and Value in Exchange Focus Factor – how much should the device Focus on the service • focus factor in iWant list– represents the intensity of the search for the desired good or service • focus factor in iHave List - represents actively does the device advertise the presence of the good or service.

  29. pHave pHave iHave iHave iWant iWant Bartering Protocol

  30. Discovery MSG Not Found initiator participant Discovered Proposal Reject Accept iHave iHave Counter Proposal iWant iWant CounterProposal RPL Bartering Protocol

  31. Discovery MSG Not Found Discovered Proposal Reject Accept iHave iHave Counter Proposal iWant iWant Contributions initiator participant CounterProposal RPL

  32. Contributions • Bartering Reasoner that answers the following questions: • What do I want, what do I offer ? (not interested…) • Who do I want to barter with? • What do I offer in return? • What do I offer them? (What’s the offer?) • Do I accept, Do I reject, or Do I counter-propose? • Do we have a deal?

  33. Contributions • Development of value based descriptions for electronic goods and services. • Development and implementation of a framework that employs and manages valuations. • Development and implementation of bartering protocols / strategies that take: • Relationships-Based Bartering • Service Attribute Bartering • Demonstration of P2P environment that incentivizes collaboration.

  34. Presentation Outline PLAN • Introduction • Motivation • Proposed Approach • Research Contributions • Research Plan & TimeLine • Preliminary Work • Related Work • Summary and Q&A

  35. Tasks PLAN • Value based descriptions for services and electronic goods • Management component that employs these descriptions • Bartering support engine • Bartering protocols and strategies. • Analysis of effectiveness of these protocols and strategies • Incorporate and study effects of DRM • Demonstration of P2P environment that incentivizes collaboration • Analysis and Evaluation

  36. Time Table PLAN

  37. Presentation Outline PW • Introduction • Motivation • Proposed Approach • Research Contributions • Research Plan & TimeLine • Preliminary Work • Related Work • Summary and Q&A

  38. Preliminary Work PW • Allia - Policy-Based Alliance Formation for Agents in Ad-Hoc Environments • Agents2Go - An Infrastructure for Location-Dependent Service Discovery in The Mobile Electronic Commerce Environment • Numi - Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks • eNcentive - A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments • eNcentive+TrueBahn -mCommerceand Trust

  39. Olga Ratsimor, Anupam Joshi, Timothy Finin, Yelena Yesha,  eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments, The 5th International Conference on Electronic Commerce (ICEC), October 2003 Olga Ratsimor, Anupam Joshi, Timothy Finin, Yelena Yesha,  Intelligent Ad Hoc Marketing within Hotspot Networks, Technical Report, Nov 2003 Olga Ratsimor, Dipanjan Chakraborty, Deepali Khushraj, Anugeetha Kunjithapatham, Anupam Joshi, Timothy Finin, Yelena Yesha Service Discovery in Agent-based Pervasive Computing Environments, Journal on Mobile Networking and Applications (MONET), Special issue on Mobile and Pervasive Commerce. 2003. Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam Joshi, Timothy Finin, Yelena Yesha, Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks , IEEE International Conference on Pervasive Computing and Communications (PerCom), March 2003. Olga Ratsimor, Sethuram Balaji Kodeswaran, Anupam Joshi, Timothy Finin, Yelena Yesha, Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks, Workshop on "Ad hoc Communications and Collaboration in Ubiquitous Computing Environments", November 2002. Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam Joshi, Timothy Finin, Yelena Yesha,Numi: A Framework for Collaborative Data Management in a Network of InfoStations, UMBC SRC, November 2002 Olga Ratsimor, Dipanjan Chakraborty, Sovrin Tolia, Deepali Kushraj, Anugeetha Kunjithapatham, Gaurav Gupta, Anupam Joshi, Timothy Finin, Allia: Alliance-based Service Discovery for Ad-Hoc Environments, Paper, ACM Mobile Commerce Workshop, September, 2002. Tim Finin, Anupam Joshi, Lalana Kagal, Olga Ratsimor, Sasikanth Avancha, Vlad Korolev, Harry Chen, Filip Perich, R. Scott Cost, Intelligent Agents for Mobile and Embedded Devices, International Journal on CooperativeInformation Systems, 2002. Timothy Finin, Anupam Joshi, Lalana Kagal, Olga Ratsimor, Vlad Korolev, and Harry Chen, Information Agents for Mobile and Embedded Devices, Paper, Fifth International Workshop Cooperative Information Agents, Modena, Italy, September, 2001. Olga Ratsimor, Vladimir Korolev, Anupam Joshi, and Timothy Finin,Agents2Go: An Infrastructure for Location-Dependent Service Discovery in the Mobile Electronic Commerce Environment,Paper, ACM Mobile Commerce Workshop, July, 2001. Preliminary Work Publications PW

  40. Agents2Go PW • Location dependent services discovery • Location dependent information retrieval • Distributed services • Service information is distributed and grouped by regions. • Information about the restaurant is stored locally. • Automatic location detection • Cell tower ids are mapped to the geographical region name. • Service provider representation • Service Agents reside at the service provider locations. • Restaurant Agents reside at the restaurant locations.

  41. Landing Zones are islands of high speed cheap connectivity around a Service Portal limited only by that portals wireless range Transit Zones are regions where there is no network connection In Landing Zones, mobile hosts communicate with service portals only In Transit Zones, mobile hosts communicate with each other MH1 MH2 Numi PW Landing Zone Transit Zone Landing Zone

  42. eNcentive PW • eNcentiveis a framework that facilitates peer to peer mobile marketing in pervasive environments • Mobile users collect promotions, advertisements, coupons and other discount information • User preferences effect adds collection and distribution • Mobile users market that information to other users in the network • Active distributors are rewarded • Incentives for distribution are proportional to the amount of advertisements effectively distributed by the user • Wide choice of Reward Models

  43. Mobility Coordinator PW

  44. eNcentive PDA Interface PW

  45. eNcentive+TrueBahn PW • Trust based mobile shopping • Mobile users are divided into tow groups • Kids and Adults • Groups are interlined • Kids have a circle of friends that can grow and shrink • Adults have circle of other Adults that they trust. The circle can grow and shrink. • Kids can shop for items that thy have been authorized to buy • If there is a new item on the wish list then kids need to find an Adult form their trust network to give them authorization.

  46. Allia PW • Peer-to-peer caching of service information from neighboring nodes • An Alliance of a particular node is a set of nodes whose local service information is cached by this node. • Policy-based advertising, caching and Alliance formation • Each node runs a lightweight version of mandatory FIPA platform components • A Policy Manager controlled the behavior of the platform. Restrict platform functionality in respect to device capability Specify priorities among services and sharing of available resources among services Specifying advertisement and request message forwarding algorithms Specify security restrictions like access rights and credential verification Specify application specific preferences Specify caching preferences Specifying advertisement preferences Specify personal user preferences

  47. Presentation Outline RW • Introduction • Motivation • Proposed Approach • Research Contributions • Research Plan & TimeLine • Preliminary Work • Related Work • Summary and Q&A

  48. Related Work RW • Context-aware Computing • P2P File Sharing • Mobile P2PSystems • mCommerce • Electronic Goods and Services

  49. Context-aware Computing RW • Ambient Services • l-commerece marketplace • Context Mediation • Valuation of context information • myCampus • eWallet manages user’s context • Personal resources are modeled as semantic web services • Context management includes privacy management

  50. P2P File Sharing RW Mojo Nation • Internal currency call Mojowas used to purchasing files from other peers • Userscould earned Mojo currency through sharing their disk space, processing power, bandwidth … • Central bank cleared transactions Karma - Economic Framework for P2P Resource Sharing • Internal currency called Karma • Karma used a secure exchange mechanism to prevent counterfeiting of Karma currency • Framework used anti-inflation deflation mechanism to regulates currency in the system. • Framework used peer-to-peer scheme for tracking currency transfers

More Related