Title: V8
1V8
2Semi Automated Bartering of Digital Goods and
Services in Pervasive Environments
- Olga Ratsimor
- Doctoral Research Proposal
- October 25 2005
3Presentation Outline
INTRO
- Introduction
- Thesis Statement
- Motivation
- Proposed Approach
- Research Contributions
- Research Plan TimeLine
- Preliminary Work
- Related Work
- Summary and QA
4Pervasive Computing Vision
INTRO
5Issues Affecting Collaboration
INTRO
- No incentive for collaborations
- Self-interested personal mobile devices have
limited resources - Free Rider Problems in Pervasive Environments
- In attempt to conserve its computing resources
and power, device drops service requests and
other communications from other devices while
sending out service discovery requests for its
own benefit. - Information Noise Makers and Spammers
- Spamming and other heavy communication services.
- Devices must be capable of filtering out noise
still being able to collect useful information
and discover needed services.
6Environmental Limitations
INTRO
- Quality of Services is Unpredictable
- Received goods and services may not be what
originally was expected. - Utility function various on perceived context,
time, location, etc. - Inefficient Storage of Context Specific Services
- Many of the services are very context specific
and are used only during a particular context. - When the user changes context, unused services
continue to take up space and resources on the
devices.
7Hypothesis Statement
HS
- The Question
- Considering the diversity and the personal nature
of devices participating in pervasive
environments, is the current model of altruistic
ad hoc collaborations still the most effective
model to motivate collaborations? - The Hypothesis
- Bartering can be an effective mechanism to
incentivize devices to collaborate and improve
the quality of collaborations. - The Proposed Approach
- Incentive driven collaboration mechanisms
- Communication model based on bartering
- Value based view of electronic goods and services
8Presentation Outline
MOTIV
- Introduction
- Thesis Statement
- Motivation
- Proposed Approach
- Research Contributions
- Research Plan TimeLine
- Preliminary Work
- Related Work
- Summary and QA
9Basic Scenario - 1
MOTIV
10Counter Proposal Scenario - 2
MOTIV
11Relationship Scenario - 3
MOTIV
12Investment Scenario - 4
MOTIV
D2
D1
Has RingTone-B Wants Song-A
D3
D2
13Similarity Scenario 5
MOTIV
14Domain What are Goods
MOTIV
- Digital Goods
- Ring Tones, MP3s, Podcasts, Mobile Games, Screen
Savers, Wallpaper, Video and Coupons - Low Cost Items
- Replicable
- Digital Rights Management (DRM)
- transfer of ownership
- Digital Goods are obtained
- for personal use
- to be used as token in future bartering
15Double Coincidence of Wants
MOTIV
- A barter exchange requires a double coincidence
of wants for trade to take place - An exchange between two parties can only occur
if both parties desire what the other is willing
to give up - The probability that one person has what the
other desires is not in our favor. - Our model relaxes the constraint
- Improves the participation and tolerance levels
16What is Needed?
MOTIV
- We need to develop
- Define and use Bartering protocols that are aware
of personal relationships between the devices and
their users perceived value of electronic goods
and services. - Valuation of electronic goods and services in
personalized context conscious manner.
17Presentation Outline
- Introduction
- Thesis Statement
- Motivation
- Proposed Approach
- Research Contributions
- Research Plan TimeLine
- Preliminary Work
- Related Work
- Summary and QA
18Bartering Model
- Context-based, continuous bartering with peers in
pervasive environments - In order to barter, one has to understand what
the items are worth and how much they are worth. - One also wants to evaluate who s/he is dealing
with. - Difference between community and anonymous P2P
network
19Perceived Value
- Value in Use - is the value of the particular
electronic good or service for the particular
user. - Value in Exchange - reflects the potential value
of the service against any other service in
value-for-value exchanges.
20Aspects of Value
- Systemic Value represents the essence of the
digital goods and services - Liquidity reflects the ease with which a service
can be acquired or exchanged for any service
without a significant loss in value. - Simplicity and similar value are the key factors.
- A service is highly liquid if it can be exchanged
frequently by many devices for services of a
similar value. - Services with higher liquidity index would be in
greater demand in the computing environment and
could be used by devices as exchange tokens.
21Aspects of Value
- Context Based Value is the value that describes
importance of the service or information in a
particular context. - Original Cost of the service or information
reflects resources or money that had to be spent
to initially acquire the services. - Historic Value refers to the historic recorded
value for the service of information. - Original Value
22Aspects of Value
- Store of Value refers to how consistently can the
service store its value. Services and information
value can depreciate or appreciate over time. - Depreciation over time
- expiration time and date
- limit on replication.
- Appreciation over time
- Memorabilia
- Transaction Cost describes costs involved in
searching, bargaining and transferring data and
verifying the correctness and finalization of
transaction. - Service Maintenance Cost describes the costs
associated with keeping the service up to date. - Frequency of Use Valuation - service that is
frequently used have greater value
23Aspects of Value
- Attribute Based Valuation attributes of the
service have a value function that represents the
importance of the attribute. - Composability Index () reflects on how many
other services can a particular service be
composed with. - Handy component
- Value in exchange - composability index is
proportional to the number of the services on in
the environment that could be composed with a
particular service. - Services with high composability index would be
in greater demand in the computing environment. - Looking for input on better definition and
terminology.
24Value in Use
25Value in Exchange
26Relationships
- Exploit relationships between groups of devices
- Self Devices - are personal devices that belong
to a single user. - Sibling Devices - are devices of users that are
very close.
- Friendly Devices - are devices that belong to the
different users that frequently come in contact
and collaborate with one another. - Strangers Devices - are devices that just meet
and are most likely will never come in contact
again. - Siblings and Strangers are special cases of
friendliness. - Unfriendly Devices - are devices that are
actively uncooperative - Trust could also be used to determine the level
of cooperation - Other Social Networks
- Linked In Orkut
27Bartering Protocol
- Each platform has three lists
- pHave list of goods and services that device
has but keeps private - iWant list of goods and services that device
desires and is actively searching for - iHave list of goods and services that device is
willing to exchange for other services
28Bartering Protocol
- iWant List and iHave List will contain value
based descriptions of each goods and services - Value in Use and Value in Exchange
- Focus Factor how much should the device Focus
on the service - focus factor in iWant list represents the
intensity of the search for the desired good or
service - focus factor in iHave List - represents actively
does the device advertise the presence of the
good or service.
29Bartering Protocol
30Bartering Protocol
31Contributions
initiator
participant
Counter Proposal RPL
32Contributions
- Bartering Reasoner that answers the following
questions - What do I want, what do I offer ? (not
interested) - Who do I want to barter with?
- What do I offer in return?
- What do I offer them? (Whats the offer?)
- Do I accept, Do I reject, or Do I
counter-propose? - Do we have a deal?
33Contributions
- Development of value based descriptions for
electronic goods and services. - Development and implementation of a framework
that employs and manages valuations. - Development and implementation of bartering
protocols / strategies that take - Relationships-Based Bartering
- Service Attribute Bartering
- Demonstration of P2P environment that
incentivizes collaboration.
34Presentation Outline
PLAN
- Introduction
- Motivation
- Proposed Approach
- Research Contributions
- Research Plan TimeLine
- Preliminary Work
- Related Work
- Summary and QA
35Tasks
PLAN
- Value based descriptions for services and
electronic goods - Management component that employs these
descriptions - Bartering support engine
- Bartering protocols and strategies.
- Analysis of effectiveness of these protocols and
strategies - Incorporate and study effects of DRM
- Demonstration of P2P environment that
incentivizes collaboration - Analysis and Evaluation
36Time Table
PLAN
37Presentation Outline
PW
- Introduction
- Motivation
- Proposed Approach
- Research Contributions
- Research Plan TimeLine
- Preliminary Work
- Related Work
- Summary and QA
38Preliminary Work
PW
- Allia - Policy-Based Alliance Formation for
Agents in Ad-Hoc Environments - Agents2Go - An Infrastructure for
Location-Dependent Service Discovery in The
Mobile Electronic Commerce Environment - Numi - Using Peer-to-Peer Data Routing for
Infrastructure-Based Wireless Networks - eNcentive - A Framework for Intelligent Marketing
in Mobile Peer-To-Peer Environments - eNcentive TrueBahn - mCommerce and Trust
39Preliminary Work Publications
PW
- Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam
Joshi, Timothy Finin, Yelena Yesha, Numi A
Framework for Collaborative Data Management in a
Network of InfoStations, UMBC SRC, November 2002 - Olga Ratsimor, Dipanjan Chakraborty, Sovrin
Tolia, Deepali Kushraj, Anugeetha Kunjithapatham,
Gaurav Gupta, Anupam Joshi, Timothy Finin, Allia
Alliance-based Service Discovery for Ad-Hoc
Environments, Paper, ACM Mobile Commerce
Workshop, September, 2002. - Tim Finin, Anupam Joshi, Lalana Kagal, Olga
Ratsimor, Sasikanth Avancha, Vlad Korolev, Harry
Chen, Filip Perich, R. Scott Cost, Intelligent
Agents for Mobile and Embedded Devices,
International Journal on CooperativeInformation
Systems, 2002. - Timothy Finin, Anupam Joshi, Lalana Kagal, Olga
Ratsimor, Vlad Korolev, and Harry Chen,
Information Agents for Mobile and Embedded
Devices, Paper, Fifth International Workshop
Cooperative Information Agents, Modena, Italy,
September, 2001. - Olga Ratsimor, Vladimir Korolev, Anupam Joshi,
and Timothy Finin,Agents2Go An Infrastructure
for Location-Dependent Service Discovery in the
Mobile Electronic Commerce Environment,Paper,
ACM Mobile Commerce Workshop, July, 2001.
- Olga Ratsimor, Anupam Joshi, Timothy Finin,
Yelena Yesha, eNcentive A Framework for
Intelligent Marketing in Mobile Peer-To-Peer
Environments, The 5th International Conference on
Electronic Commerce (ICEC), October 2003 - Olga Ratsimor, Anupam Joshi, Timothy Finin,
Yelena Yesha, Intelligent Ad Hoc Marketing
within Hotspot Networks, Technical Report, Nov
2003 - Olga Ratsimor, Dipanjan Chakraborty, Deepali
Khushraj, Anugeetha Kunjithapatham, Anupam Joshi,
Timothy Finin, Yelena Yesha Service Discovery in
Agent-based Pervasive Computing Environments,
Journal on Mobile Networking and Applications
(MONET), Special issue on Mobile and Pervasive
Commerce. 2003. - Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam
Joshi, Timothy Finin, Yelena Yesha, Using
Peer-to-Peer Data Routing for Infrastructure-based
Wireless Networks , IEEE International
Conference on Pervasive Computing and
Communications (PerCom), March 2003. - Olga Ratsimor, Sethuram Balaji Kodeswaran, Anupam
Joshi, Timothy Finin, Yelena Yesha, Combining
Infrastructure and Ad hoc Collaboration For Data
Management in Mobile Wireless Networks, Workshop
on "Ad hoc Communications and Collaboration in
Ubiquitous Computing Environments", November
2002.
40Agents2Go
PW
- Location dependent services discovery
- Location dependent information retrieval
- Distributed services
- Service information is distributed and grouped by
regions. - Information about the restaurant is stored
locally. - Automatic location detection
- Cell tower ids are mapped to the geographical
region name. - Service provider representation
- Service Agents reside at the service provider
locations. - Restaurant Agents reside at the restaurant
locations.
41Numi
PW
- Landing Zones are islands of high speed cheap
connectivity around a Service Portal limited only
by that portals wireless range - Transit Zones are regions where there is no
network connection - In Landing Zones, mobile hosts communicate with
service portals only - In Transit Zones, mobile hosts communicate with
each other
Landing Zone
Transit Zone
Landing Zone
42eNcentive
PW
- eNcentive is a framework that facilitates peer
to peer mobile marketing in pervasive
environments - Mobile users collect promotions, advertisements,
coupons and other discount information - User preferences effect adds collection and
distribution - Mobile users market that information to other
users in the network - Active distributors are rewarded
- Incentives for distribution are proportional to
the amount of advertisements effectively
distributed by the user - Wide choice of Reward Models
43Mobility Coordinator
PW
44eNcentive PDA Interface
PW
45eNcentive TrueBahn
PW
- Trust based mobile shopping
- Mobile users are divided into tow groups
- Kids and Adults
- Groups are interlined
- Kids have a circle of friends that can grow and
shrink - Adults have circle of other Adults that they
trust. The circle can grow and shrink. - Kids can shop for items that thy have been
authorized to buy - If there is a new item on the wish list then kids
need to find an Adult form their trust network to
give them authorization.
46Allia
PW
- Peer-to-peer caching of service information from
neighboring nodes - An Alliance of a particular node is a set of
nodes whose local service information is cached
by this node. - Policy-based advertising, caching and Alliance
formation - Each node runs a lightweight version of mandatory
FIPA platform components - A Policy Manager controlled the behavior of the
platform. - Restrict platform functionality in respect to
device capability - Specify priorities among services and sharing of
available resources among services - Specifying advertisement and request message
forwarding algorithms - Specify security restrictions like access rights
and credential verification - Specify application specific preferences
- Specify caching preferences
- Specifying advertisement preferences
- Specify personal user preferences
47Presentation Outline
RW
- Introduction
- Motivation
- Proposed Approach
- Research Contributions
- Research Plan TimeLine
- Preliminary Work
- Related Work
- Summary and QA
48Related Work
RW
- Context-aware Computing
- P2P File Sharing
- Mobile P2PSystems
- mCommerce
- Electronic Goods and Services
49Context-aware Computing
RW
- Ambient Services
- l-commerece marketplace
- Context Mediation
- Valuation of context information
- myCampus
- eWallet manages users context
- Personal resources are modeled as semantic web
services - Context management includes privacy management
50P2P File Sharing
RW
- Mojo Nation
- Internal currency call Mojo was used to
purchasing files from other peers - Users could earned Mojo currency through sharing
their disk space, processing power, bandwidth - Central bank cleared transactions
- Karma - Economic Framework for P2P Resource
Sharing - Internal currency called Karma
- Karma used a secure exchange mechanism to prevent
counterfeiting of Karma currency - Framework used anti-inflation deflation mechanism
to regulates currency in the system. - Framework used peer-to-peer scheme for tracking
currency transfers
51Mobile P2P Computing
RW
- Infostations
- any time, anywhere connectivity
- data hoarding in mobile environments
- Proem Wearable Computing
- Wearable communities
- Augmenting face to face interactions
- personal digital sphere
- Mogatu - Serendipitous Query Routing and
Processing - Personal user profiles
- Caching and replication algorithms
52mCommerece
RW
- EasiShop
- Cross merchant product comparison shopping
- Shopping mobile agent
- Market Place is a meeting point of shopping and
retailer agents - iClouds
- Mobile Advertising
- Anonymous bonus points
- iHave and iWant List
53Summary
Semi Automated Bartering of Digital Goods and
Services in Pervasive Environments
54QA
55Backup Slides
56Value in Use
- Value of the service for internal use of the
device is tied to a set of factors. - Systemic Value core function of the service
- Frequency of Use Valuation
- Contextually Based Value importance particular
context - Attribute Based Valuation
- Maintenance Costs
- Store of Value degradation or appreciation
57Value in Exchange
- Service value in exchange is mainly related to
the environmental factors. - Liquidity - simplicity and similar value during
exchange - Transaction Costs
- Service Maintenance Costs
- Store of Value
- Composability
58Motivation - Scenario 1
- D1 is interested in acquiring Song-A.
- D1 discovers that D2 and D3 are the devices that
could potentially offer the song. - D1 contacts D2 and proposes an exchange of Song-A
for a RingTone-B. - D2 responds with a rejection. D2 is not
interested in ring tones. - D1 contacts D3 with same proposal.
- D3 is interested in RingTone-B that D1 offers.
- D3 responds with a positive reply.
- D1 and D3 conduct a transaction and exchange
Song-A and RingTone-B.
59Motivation - Scenario 2
D3
- D2 is interested in acquiring ScreenSaver-A.
- D2 discovers that D5 is only device that has
ScreenSaver-A. - D2 sends a proposal that lists a set of choices
that D5 can have in exchange for ScreenSaver-A. - Choice-A Wallpaper-A
- Choice-B Song-A
- Choice-C RingTone-B
- Choice-D RingTone-C
- D5 sends a counter proposal. ScreenSaver-A for
two ring tones, RingTone-B and C. - D2 agrees.
- D2 and D5 conduct a transaction and exchange
ScreenSaver-A for RingTone-B and C.
60Motivation - Scenario 3
D3
D4
Has Map-A, RingTone-A,C Wants RingTone-B
- D2 and device D4 are owned by two sisters (that
like each other). - Both devices are aware of this relationship.
- D4 is interested in acquiring RingTone-B.
- D4, by default, will prefer to barter with the
sibling device even though D1 and D3 have this
ring tone - D4 composes proposal requesting RingTone-B
- in exchange offering either Map-A or a RingTone-A
or C. - D2 is not interested in maps or ring tones.
- D2 is looking for Wallpaper-B which D4 does not
have. - D2, instead of sending a rejection to D4,
considers the relationship and offers D4 much
desired RingTone-B with out anything in return.
61Motivation - Scenario 4
D2
D1
Has RingTone-B Wants Song-A
D3
D2
- D1 is interested in acquiring RingTone-B. D1
discovers that D2 has RingTone-B. - Unfortunately, D2 is not personally interested in
RingTone-A that D1 is offering in return. - D2 identify that RingTone-A is in grate demand by
other devices. - D2 looks at RingTone-A as an investment that
could be later cashed out. - D2 accepts the proposal from D1 and exchanges
RingTone-B for RingTone-A. - At a later time, D2 meets D3.
- D2 identifies that D3 has Song-A
- D2 composes a counter proposal to exchange of
Song-A for RingTone-A or a RingTone-B. - D3 responds with counter proposal suggesting to
exchange Song-A for the two ring tones. - D2 agrees to D3s counter proposal.
62Motivation - Scenario 5
D2
D1
Has RingTone-A Length
10sec Type monophonic
Styledance RingTone-C
Length 5sec Type
polyphonic Styledance Wants
Song- Performer
singer-A
Has Song-A Titletitle-A
Performer singer-A
Stylepop Wants RingTone- Type
polyphonic Length gt 8sec
D2
D1
- D1 is interested in acquiring Song-B which is not
available in the environment. - D2 is searching for RingTone-B which is also
unavailable. - D1 and D2 could keep looking for a perfect match
or could look for similar services. - D1 identifies that the most important feature of
the song was a performer, Singer-A. - D2 determines that is interested in polyphonic
ring tones that are longer then 8 sec. - D1 discovers that D2 has a Song-A performed by
Singer-A. - D1 composes a proposal to exchange RingTone-A or
RingTone-C for the Song-A. - D2 determines that nether RingTone-A or
RingTone-C match all of the attributes - D2 decides to farther relax its requirements and
ignore the length of the ring. - D2 accepts the proposal from D1. D1 and D2
exchange Song-A and RingTone-C.
63N-way Exchange
- D1, D2 and D3 in the environment.
- D1 is interested in acquiring RingTone-B form D2.
- D2 is interested in acquiring RingTone-C from D3.
- D3 is interested in acquiring RingTone-A.
- Approach A
- D1 discovers the chain/loop composes a proposal
that is forwarded to D2 and D3. - D2 and D3 generate responses and forward them to
the rest of the chain/loop. - Once the consensus is reached devices exchange
the ring tone.
- Approach B
- D1 determines that there is a demand for
RingTone-C. - D1 acquires RingTone-C from D3 as an investment
for future use. - D1 later caches out its investment and resells
RingTone-C to D2.
64Allia Protocols
- Request Protocol
- Requester
- Check DF if the service is local
- Check Local Cache if there is a hint
- Multicast or Broadcast the request
- Receiver
- Decide if to accept the request
- Check DF if the service is local
- Check Local Cache if there is a hint
- Advertisement Exchange Protocol
- Advertiser
- Send advertisement
- Receiver
- Decide if to accept the advertisement
- Decide if to cache the advertisement
- Decide if to forward the advertisement to there
nodes
65Numi Framework
- Heartbeat Generator Agent is responsible for
broadcasting device presence messages - Location Monitor Agent is responsible for
identifying whether or not that device is
currently in a landing zone or a transit zone - Message Handler Agent is responsible for handling
the messaging needs of the framework - Logger Agent records every interaction that takes
place on the local device - Task Scheduler Agent is responsible for
scheduling prescribed tasks at various times - Data Handler Agent is used for transferring data
volumes between MHs and between an MH and an SP - Portal Service Agents run on top of our Numi
platform on SPs and offer services to a user - Node Service Agent runs within NUMI on an MH
offering a service to the user - Service Manager Agent is responsible for managing
service agents on a platform
66Reward Interface
67eNcentive
Animated Slide
68Numi Usage Scenario
Animated Slide
69eNcentive Location Targeting
Animated Slide
70(No Transcript)