V8

1 / 70
About This Presentation
Title:

V8

Description:

Wallpaper-B. MOTIV. 10 / 54. Counter Proposal Scenario - 2. Has: Map-A, RingTone-A,C ... Podcasts, Mobile Games, Screen Savers, Wallpaper, Video and Coupons ... – PowerPoint PPT presentation

Number of Views:80
Avg rating:3.0/5.0
Slides: 71
Provided by: csU59

less

Transcript and Presenter's Notes

Title: V8


1
V8
2
Semi Automated Bartering of Digital Goods and
Services in Pervasive Environments
  • Olga Ratsimor
  • Doctoral Research Proposal
  • October 25 2005

3
Presentation Outline
INTRO
  • Introduction
  • Thesis Statement
  • Motivation
  • Proposed Approach
  • Research Contributions
  • Research Plan TimeLine
  • Preliminary Work
  • Related Work
  • Summary and QA

4
Pervasive Computing Vision
INTRO
5
Issues Affecting Collaboration
INTRO
  • No incentive for collaborations
  • Self-interested personal mobile devices have
    limited resources
  • Free Rider Problems in Pervasive Environments
  • In attempt to conserve its computing resources
    and power, device drops service requests and
    other communications from other devices while
    sending out service discovery requests for its
    own benefit.
  • Information Noise Makers and Spammers
  • Spamming and other heavy communication services.
  • Devices must be capable of filtering out noise
    still being able to collect useful information
    and discover needed services.

6
Environmental Limitations
INTRO
  • Quality of Services is Unpredictable
  • Received goods and services may not be what
    originally was expected.
  • Utility function various on perceived context,
    time, location, etc.
  • Inefficient Storage of Context Specific Services
  • Many of the services are very context specific
    and are used only during a particular context.
  • When the user changes context, unused services
    continue to take up space and resources on the
    devices.

7
Hypothesis Statement
HS
  • The Question
  • Considering the diversity and the personal nature
    of devices participating in pervasive
    environments, is the current model of altruistic
    ad hoc collaborations still the most effective
    model to motivate collaborations?
  • The Hypothesis
  • Bartering can be an effective mechanism to
    incentivize devices to collaborate and improve
    the quality of collaborations.
  • The Proposed Approach
  • Incentive driven collaboration mechanisms
  • Communication model based on bartering
  • Value based view of electronic goods and services

8
Presentation Outline
MOTIV
  • Introduction
  • Thesis Statement
  • Motivation
  • Proposed Approach
  • Research Contributions
  • Research Plan TimeLine
  • Preliminary Work
  • Related Work
  • Summary and QA

9
Basic Scenario - 1
MOTIV
10
Counter Proposal Scenario - 2
MOTIV
11
Relationship Scenario - 3
MOTIV
12
Investment Scenario - 4
MOTIV
D2
D1
Has RingTone-B Wants Song-A
D3
D2
13
Similarity Scenario 5
MOTIV
14
Domain What are Goods
MOTIV
  • Digital Goods
  • Ring Tones, MP3s, Podcasts, Mobile Games, Screen
    Savers, Wallpaper, Video and Coupons
  • Low Cost Items
  • Replicable
  • Digital Rights Management (DRM)
  • transfer of ownership
  • Digital Goods are obtained
  • for personal use
  • to be used as token in future bartering

15
Double Coincidence of Wants
MOTIV
  • A barter exchange requires a double coincidence
    of wants for trade to take place
  • An exchange between two parties can only occur
    if both parties desire what the other is willing
    to give up
  • The probability that one person has what the
    other desires is not in our favor.
  • Our model relaxes the constraint
  • Improves the participation and tolerance levels

16
What is Needed?
MOTIV
  • We need to develop
  • Define and use Bartering protocols that are aware
    of personal relationships between the devices and
    their users perceived value of electronic goods
    and services.
  • Valuation of electronic goods and services in
    personalized context conscious manner.

17
Presentation Outline
  • Introduction
  • Thesis Statement
  • Motivation
  • Proposed Approach
  • Research Contributions
  • Research Plan TimeLine
  • Preliminary Work
  • Related Work
  • Summary and QA

18
Bartering Model
  • Context-based, continuous bartering with peers in
    pervasive environments
  • In order to barter, one has to understand what
    the items are worth and how much they are worth.
  • One also wants to evaluate who s/he is dealing
    with.
  • Difference between community and anonymous P2P
    network

19
Perceived Value
  • Value in Use - is the value of the particular
    electronic good or service for the particular
    user.
  • Value in Exchange - reflects the potential value
    of the service against any other service in
    value-for-value exchanges.

20
Aspects of Value
  • Systemic Value represents the essence of the
    digital goods and services
  • Liquidity reflects the ease with which a service
    can be acquired or exchanged for any service
    without a significant loss in value.
  • Simplicity and similar value are the key factors.
  • A service is highly liquid if it can be exchanged
    frequently by many devices for services of a
    similar value.
  • Services with higher liquidity index would be in
    greater demand in the computing environment and
    could be used by devices as exchange tokens.

21
Aspects of Value
  • Context Based Value is the value that describes
    importance of the service or information in a
    particular context.
  • Original Cost of the service or information
    reflects resources or money that had to be spent
    to initially acquire the services.
  • Historic Value refers to the historic recorded
    value for the service of information.
  • Original Value

22
Aspects of Value
  • Store of Value refers to how consistently can the
    service store its value. Services and information
    value can depreciate or appreciate over time.
  • Depreciation over time
  • expiration time and date
  • limit on replication.
  • Appreciation over time
  • Memorabilia
  • Transaction Cost describes costs involved in
    searching, bargaining and transferring data and
    verifying the correctness and finalization of
    transaction.
  • Service Maintenance Cost describes the costs
    associated with keeping the service up to date.
  • Frequency of Use Valuation - service that is
    frequently used have greater value

23
Aspects of Value
  • Attribute Based Valuation attributes of the
    service have a value function that represents the
    importance of the attribute.
  • Composability Index () reflects on how many
    other services can a particular service be
    composed with.
  • Handy component
  • Value in exchange - composability index is
    proportional to the number of the services on in
    the environment that could be composed with a
    particular service.
  • Services with high composability index would be
    in greater demand in the computing environment.
  • Looking for input on better definition and
    terminology.

24
Value in Use
25
Value in Exchange
26
Relationships
  • Exploit relationships between groups of devices
  • Self Devices - are personal devices that belong
    to a single user.
  • Sibling Devices - are devices of users that are
    very close.
  • Friendly Devices - are devices that belong to the
    different users that frequently come in contact
    and collaborate with one another.
  • Strangers Devices - are devices that just meet
    and are most likely will never come in contact
    again.
  • Siblings and Strangers are special cases of
    friendliness.
  • Unfriendly Devices - are devices that are
    actively uncooperative
  • Trust could also be used to determine the level
    of cooperation
  • Other Social Networks
  • Linked In Orkut

27
Bartering Protocol
  • Each platform has three lists
  • pHave list of goods and services that device
    has but keeps private
  • iWant list of goods and services that device
    desires and is actively searching for
  • iHave list of goods and services that device is
    willing to exchange for other services

28
Bartering Protocol
  • iWant List and iHave List will contain value
    based descriptions of each goods and services
  • Value in Use and Value in Exchange
  • Focus Factor how much should the device Focus
    on the service
  • focus factor in iWant list represents the
    intensity of the search for the desired good or
    service
  • focus factor in iHave List - represents actively
    does the device advertise the presence of the
    good or service.

29
Bartering Protocol
30
Bartering Protocol
31
Contributions
initiator
participant
Counter Proposal RPL
32
Contributions
  • Bartering Reasoner that answers the following
    questions
  • What do I want, what do I offer ? (not
    interested)
  • Who do I want to barter with?
  • What do I offer in return?
  • What do I offer them? (Whats the offer?)
  • Do I accept, Do I reject, or Do I
    counter-propose?
  • Do we have a deal?

33
Contributions
  • Development of value based descriptions for
    electronic goods and services.
  • Development and implementation of a framework
    that employs and manages valuations.
  • Development and implementation of bartering
    protocols / strategies that take
  • Relationships-Based Bartering
  • Service Attribute Bartering
  • Demonstration of P2P environment that
    incentivizes collaboration.

34
Presentation Outline
PLAN
  • Introduction
  • Motivation
  • Proposed Approach
  • Research Contributions
  • Research Plan TimeLine
  • Preliminary Work
  • Related Work
  • Summary and QA

35
Tasks
PLAN
  • Value based descriptions for services and
    electronic goods
  • Management component that employs these
    descriptions
  • Bartering support engine
  • Bartering protocols and strategies.
  • Analysis of effectiveness of these protocols and
    strategies
  • Incorporate and study effects of DRM
  • Demonstration of P2P environment that
    incentivizes collaboration
  • Analysis and Evaluation

36
Time Table
PLAN
37
Presentation Outline
PW
  • Introduction
  • Motivation
  • Proposed Approach
  • Research Contributions
  • Research Plan TimeLine
  • Preliminary Work
  • Related Work
  • Summary and QA

38
Preliminary Work
PW
  • Allia - Policy-Based Alliance Formation for
    Agents in Ad-Hoc Environments
  • Agents2Go - An Infrastructure for
    Location-Dependent Service Discovery in The
    Mobile Electronic Commerce Environment
  • Numi - Using Peer-to-Peer Data Routing for
    Infrastructure-Based Wireless Networks
  • eNcentive - A Framework for Intelligent Marketing
    in Mobile Peer-To-Peer Environments
  • eNcentive TrueBahn - mCommerce and Trust

39
Preliminary Work Publications
PW
  • Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam
    Joshi, Timothy Finin, Yelena Yesha, Numi A
    Framework for Collaborative Data Management in a
    Network of InfoStations, UMBC SRC, November 2002
  • Olga Ratsimor, Dipanjan Chakraborty, Sovrin
    Tolia, Deepali Kushraj, Anugeetha Kunjithapatham,
    Gaurav Gupta, Anupam Joshi, Timothy Finin, Allia
    Alliance-based Service Discovery for Ad-Hoc
    Environments, Paper, ACM Mobile Commerce
    Workshop, September, 2002.
  • Tim Finin, Anupam Joshi, Lalana Kagal, Olga
    Ratsimor, Sasikanth Avancha, Vlad Korolev, Harry
    Chen, Filip Perich, R. Scott Cost, Intelligent
    Agents for Mobile and Embedded Devices,
    International Journal on CooperativeInformation
    Systems, 2002.
  • Timothy Finin, Anupam Joshi, Lalana Kagal, Olga
    Ratsimor, Vlad Korolev, and Harry Chen,
    Information Agents for Mobile and Embedded
    Devices, Paper, Fifth International Workshop
    Cooperative Information Agents, Modena, Italy,
    September, 2001.
  • Olga Ratsimor, Vladimir Korolev, Anupam Joshi,
    and Timothy Finin,Agents2Go An Infrastructure
    for Location-Dependent Service Discovery in the
    Mobile Electronic Commerce Environment,Paper,
    ACM Mobile Commerce Workshop, July, 2001.
  • Olga Ratsimor, Anupam Joshi, Timothy Finin,
    Yelena Yesha,  eNcentive A Framework for
    Intelligent Marketing in Mobile Peer-To-Peer
    Environments, The 5th International Conference on
    Electronic Commerce (ICEC), October 2003
  • Olga Ratsimor, Anupam Joshi, Timothy Finin,
    Yelena Yesha,  Intelligent Ad Hoc Marketing
    within Hotspot Networks, Technical Report, Nov
    2003
  • Olga Ratsimor, Dipanjan Chakraborty, Deepali
    Khushraj, Anugeetha Kunjithapatham, Anupam Joshi,
    Timothy Finin, Yelena Yesha Service Discovery in
    Agent-based Pervasive Computing Environments,
    Journal on Mobile Networking and Applications
    (MONET), Special issue on Mobile and Pervasive
    Commerce. 2003.
  • Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam
    Joshi, Timothy Finin, Yelena Yesha, Using
    Peer-to-Peer Data Routing for Infrastructure-based
    Wireless Networks , IEEE International
    Conference on Pervasive Computing and
    Communications (PerCom), March 2003.
  • Olga Ratsimor, Sethuram Balaji Kodeswaran, Anupam
    Joshi, Timothy Finin, Yelena Yesha, Combining
    Infrastructure and Ad hoc Collaboration For Data
    Management in Mobile Wireless Networks, Workshop
    on "Ad hoc Communications and Collaboration in
    Ubiquitous Computing Environments", November
    2002.

40
Agents2Go
PW
  • Location dependent services discovery
  • Location dependent information retrieval
  • Distributed services
  • Service information is distributed and grouped by
    regions.
  • Information about the restaurant is stored
    locally.
  • Automatic location detection
  • Cell tower ids are mapped to the geographical
    region name.
  • Service provider representation
  • Service Agents reside at the service provider
    locations.
  • Restaurant Agents reside at the restaurant
    locations.

41
Numi
PW
  • Landing Zones are islands of high speed cheap
    connectivity around a Service Portal limited only
    by that portals wireless range
  • Transit Zones are regions where there is no
    network connection
  • In Landing Zones, mobile hosts communicate with
    service portals only
  • In Transit Zones, mobile hosts communicate with
    each other

Landing Zone
Transit Zone
Landing Zone
42
eNcentive
PW
  • eNcentive is a framework that facilitates peer
    to peer mobile marketing in pervasive
    environments
  • Mobile users collect promotions, advertisements,
    coupons and other discount information
  • User preferences effect adds collection and
    distribution
  • Mobile users market that information to other
    users in the network
  • Active distributors are rewarded
  • Incentives for distribution are proportional to
    the amount of advertisements effectively
    distributed by the user
  • Wide choice of Reward Models

43
Mobility Coordinator
PW
44
eNcentive PDA Interface
PW
45
eNcentive TrueBahn
PW
  • Trust based mobile shopping
  • Mobile users are divided into tow groups
  • Kids and Adults
  • Groups are interlined
  • Kids have a circle of friends that can grow and
    shrink
  • Adults have circle of other Adults that they
    trust. The circle can grow and shrink.
  • Kids can shop for items that thy have been
    authorized to buy
  • If there is a new item on the wish list then kids
    need to find an Adult form their trust network to
    give them authorization.

46
Allia
PW
  • Peer-to-peer caching of service information from
    neighboring nodes
  • An Alliance of a particular node is a set of
    nodes whose local service information is cached
    by this node.
  • Policy-based advertising, caching and Alliance
    formation
  • Each node runs a lightweight version of mandatory
    FIPA platform components
  • A Policy Manager controlled the behavior of the
    platform.
  • Restrict platform functionality in respect to
    device capability
  • Specify priorities among services and sharing of
    available resources among services
  • Specifying advertisement and request message
    forwarding algorithms
  • Specify security restrictions like access rights
    and credential verification
  • Specify application specific preferences
  • Specify caching preferences
  • Specifying advertisement preferences
  • Specify personal user preferences

47
Presentation Outline
RW
  • Introduction
  • Motivation
  • Proposed Approach
  • Research Contributions
  • Research Plan TimeLine
  • Preliminary Work
  • Related Work
  • Summary and QA

48
Related Work
RW
  • Context-aware Computing
  • P2P File Sharing
  • Mobile P2PSystems
  • mCommerce
  • Electronic Goods and Services

49
Context-aware Computing
RW
  • Ambient Services
  • l-commerece marketplace
  • Context Mediation
  • Valuation of context information
  • myCampus
  • eWallet manages users context
  • Personal resources are modeled as semantic web
    services
  • Context management includes privacy management

50
P2P File Sharing
RW
  • Mojo Nation
  • Internal currency call Mojo was used to
    purchasing files from other peers
  • Users could earned Mojo currency through sharing
    their disk space, processing power, bandwidth
  • Central bank cleared transactions
  • Karma - Economic Framework for P2P Resource
    Sharing
  • Internal currency called Karma
  • Karma used a secure exchange mechanism to prevent
    counterfeiting of Karma currency
  • Framework used anti-inflation deflation mechanism
    to regulates currency in the system.
  • Framework used peer-to-peer scheme for tracking
    currency transfers

51
Mobile P2P Computing
RW
  • Infostations
  • any time, anywhere connectivity
  • data hoarding in mobile environments
  • Proem Wearable Computing
  • Wearable communities
  • Augmenting face to face interactions
  • personal digital sphere
  • Mogatu - Serendipitous Query Routing and
    Processing
  • Personal user profiles
  • Caching and replication algorithms

52
mCommerece
RW
  • EasiShop
  • Cross merchant product comparison shopping
  • Shopping mobile agent
  • Market Place is a meeting point of shopping and
    retailer agents
  • iClouds
  • Mobile Advertising
  • Anonymous bonus points
  • iHave and iWant List

53
Summary
Semi Automated Bartering of Digital Goods and
Services in Pervasive Environments
54
QA
  • QA
  • Thank You.

55
Backup Slides
56
Value in Use
  • Value of the service for internal use of the
    device is tied to a set of factors.
  • Systemic Value core function of the service
  • Frequency of Use Valuation
  • Contextually Based Value importance particular
    context
  • Attribute Based Valuation
  • Maintenance Costs
  • Store of Value degradation or appreciation

57
Value in Exchange
  • Service value in exchange is mainly related to
    the environmental factors.
  • Liquidity - simplicity and similar value during
    exchange
  • Transaction Costs
  • Service Maintenance Costs
  • Store of Value
  • Composability

58
Motivation - Scenario 1
  • D1 is interested in acquiring Song-A.
  • D1 discovers that D2 and D3 are the devices that
    could potentially offer the song.
  • D1 contacts D2 and proposes an exchange of Song-A
    for a RingTone-B.
  • D2 responds with a rejection. D2 is not
    interested in ring tones.
  • D1 contacts D3 with same proposal.
  • D3 is interested in RingTone-B that D1 offers.
  • D3 responds with a positive reply.
  • D1 and D3 conduct a transaction and exchange
    Song-A and RingTone-B.

59
Motivation - Scenario 2
D3
  • D2 is interested in acquiring ScreenSaver-A.
  • D2 discovers that D5 is only device that has
    ScreenSaver-A.
  • D2 sends a proposal that lists a set of choices
    that D5 can have in exchange for ScreenSaver-A.
  • Choice-A Wallpaper-A
  • Choice-B Song-A
  • Choice-C RingTone-B
  • Choice-D RingTone-C
  • D5 sends a counter proposal. ScreenSaver-A for
    two ring tones, RingTone-B and C.
  • D2 agrees.
  • D2 and D5 conduct a transaction and exchange
    ScreenSaver-A for RingTone-B and C.

60
Motivation - Scenario 3
D3
D4
Has Map-A, RingTone-A,C Wants RingTone-B
  • D2 and device D4 are owned by two sisters (that
    like each other).
  • Both devices are aware of this relationship.
  • D4 is interested in acquiring RingTone-B.
  • D4, by default, will prefer to barter with the
    sibling device even though D1 and D3 have this
    ring tone
  • D4 composes proposal requesting RingTone-B
  • in exchange offering either Map-A or a RingTone-A
    or C.
  • D2 is not interested in maps or ring tones.
  • D2 is looking for Wallpaper-B which D4 does not
    have.
  • D2, instead of sending a rejection to D4,
    considers the relationship and offers D4 much
    desired RingTone-B with out anything in return.

61
Motivation - Scenario 4
D2
D1
Has RingTone-B Wants Song-A
D3
D2
  • D1 is interested in acquiring RingTone-B. D1
    discovers that D2 has RingTone-B.
  • Unfortunately, D2 is not personally interested in
    RingTone-A that D1 is offering in return.
  • D2 identify that RingTone-A is in grate demand by
    other devices.
  • D2 looks at RingTone-A as an investment that
    could be later cashed out.
  • D2 accepts the proposal from D1 and exchanges
    RingTone-B for RingTone-A.
  • At a later time, D2 meets D3.
  • D2 identifies that D3 has Song-A
  • D2 composes a counter proposal to exchange of
    Song-A for RingTone-A or a RingTone-B.
  • D3 responds with counter proposal suggesting to
    exchange Song-A for the two ring tones.
  • D2 agrees to D3s counter proposal.

62
Motivation - Scenario 5
D2
D1
Has RingTone-A Length
10sec Type monophonic
Styledance RingTone-C
Length 5sec Type
polyphonic Styledance Wants
Song- Performer
singer-A
Has Song-A Titletitle-A
Performer singer-A
Stylepop Wants RingTone- Type
polyphonic Length gt 8sec
D2
D1
  • D1 is interested in acquiring Song-B which is not
    available in the environment.
  • D2 is searching for RingTone-B which is also
    unavailable.
  • D1 and D2 could keep looking for a perfect match
    or could look for similar services.
  • D1 identifies that the most important feature of
    the song was a performer, Singer-A.
  • D2 determines that is interested in polyphonic
    ring tones that are longer then 8 sec.
  • D1 discovers that D2 has a Song-A performed by
    Singer-A.
  • D1 composes a proposal to exchange RingTone-A or
    RingTone-C for the Song-A.
  • D2 determines that nether RingTone-A or
    RingTone-C match all of the attributes
  • D2 decides to farther relax its requirements and
    ignore the length of the ring.
  • D2 accepts the proposal from D1. D1 and D2
    exchange Song-A and RingTone-C.

63
N-way Exchange
  • D1, D2 and D3 in the environment.
  • D1 is interested in acquiring RingTone-B form D2.
  • D2 is interested in acquiring RingTone-C from D3.
  • D3 is interested in acquiring RingTone-A.
  • Approach A
  • D1 discovers the chain/loop composes a proposal
    that is forwarded to D2 and D3.
  • D2 and D3 generate responses and forward them to
    the rest of the chain/loop.
  • Once the consensus is reached devices exchange
    the ring tone.
  • Approach B
  • D1 determines that there is a demand for
    RingTone-C.
  • D1 acquires RingTone-C from D3 as an investment
    for future use.
  • D1 later caches out its investment and resells
    RingTone-C to D2.

64
Allia Protocols
  • Request Protocol
  • Requester
  • Check DF if the service is local
  • Check Local Cache if there is a hint
  • Multicast or Broadcast the request
  • Receiver
  • Decide if to accept the request
  • Check DF if the service is local
  • Check Local Cache if there is a hint
  • Advertisement Exchange Protocol
  • Advertiser
  • Send advertisement
  • Receiver
  • Decide if to accept the advertisement
  • Decide if to cache the advertisement
  • Decide if to forward the advertisement to there
    nodes

65
Numi Framework
  • Heartbeat Generator Agent is responsible for
    broadcasting device presence messages
  • Location Monitor Agent is responsible for
    identifying whether or not that device is
    currently in a landing zone or a transit zone
  • Message Handler Agent is responsible for handling
    the messaging needs of the framework
  • Logger Agent records every interaction that takes
    place on the local device
  • Task Scheduler Agent is responsible for
    scheduling prescribed tasks at various times
  • Data Handler Agent is used for transferring data
    volumes between MHs and between an MH and an SP
  • Portal Service Agents run on top of our Numi
    platform on SPs and offer services to a user
  • Node Service Agent runs within NUMI on an MH
    offering a service to the user
  • Service Manager Agent is responsible for managing
    service agents on a platform

66
Reward Interface
67
eNcentive
Animated Slide
68
Numi Usage Scenario
Animated Slide
69
eNcentive Location Targeting
Animated Slide
70
(No Transcript)
Write a Comment
User Comments (0)