Search results for " Allocation"
showing 10 items of 502 documents
Reliable Data Gathering in Tree-Based IEEE 802.15.4 Wireless Sensor Networks
2007
This paper describes a routing protocol for enhanced robustness in IEEE 802.15.4-based sensor networks, which also addresses typical MAC layer issues, including power management, synchronization and link reliability. The algorithm uses a single-path strategy in error-free scenarios and resorts to using alternative paths when communication errors are detected. Our proposal exploits implicit acknowledgement of reception, a feature which may be provided by data aggregation when a broadcast medium such as the wireless channel is used. Therefore MAC layer acknowledgements are not used and errors recovery relies on a caching and retransmission strategy. The protocol requires synchronization among…
Targeted Poverty Alleviation and Households’ Livelihood Strategy in a Relation-Based Society: Evidence from Northeast China
2021
Although China is experiencing a transition from a relation-based society to a rule-based society, relationships among acquaintances still play an important role in resource allocation, such as the allocation of policy resources. This is particularly true in rural China, where targeted poverty alleviation is prevalent and a relation-based social structure still dominates. However, it is still unknown how relationships affect the livelihood strategy of households in rural China and how poverty alleviation policies plays a role between them. Therefore, this paper embeds poverty alleviation into the relation-based society and explores how households respond to the policy in this specific conte…
Energy Efficient Resource Allocation for Wireless Power Transfer Enabled Collaborative Mobile Clouds
2016
In order to fully enjoy high rate broadband multimedia services, prolonging the battery lifetime of user equipment is critical for mobile users, especially for smartphone users. In this paper, the problem of distributing cellular data via a wireless power transfer enabled collaborative mobile cloud (WeCMC) in an energy efficient manner is investigated. WeCMC is formed by a group of users who have both functionalities of information decoding and energy harvesting, and are interested for cooperating in downloading content from the operators. Through device-to-device communications, the users inside WeCMC are able to cooperate during the downloading procedure and offload data from the base sta…
Resource Allocation for Edge Computing-Based Blockchain: A Game Theoretic Approach
2020
Blockchain has been progressively applied to various Internet of Things (IoT) platforms. As the efficiency of the blockchain depends on its computing capability, how to make sure the acquisition of the computational resources and participation of the devices would be the driving force. In this work, an edge computing-based blockchain network is considered, where the edge service provider (ESP) offers computational resources for the miners. The focus is to investigate an efficient incentive mechanism for the miners to purchase the computational resources. Accordingly, a two-stage Stackelberg game is formulated between the miners and ESP. By exploring the Stackelberg equilibrium of the optima…
Optimal Buffer Resource Allocation in Wireless Caching Networks
2019
Wireless caching systems have been exhaustively investigated in recent years. Due to limited buffer capacity, and unbalanced arrival and service rates, the backlogs may exist in the caching node and even cause buffer overflow. In this paper, we first investigate the relationship among backlogs, buffer capacity, data arrival rate and service rate, utilizing the martingale theory which is flexible in handling any arrival and service processes. Then given a target buffer overflow probability, the minimal required buffer portion is determined. If the devoted buffer capacity can fulfill all serving users' minimal buffer requirements, an optimization problem is constructed with the objective to m…
Executives' Commitment to Information Security
2020
Two aspects of decision-making on information security spending, executives' varying preferences for how proposals should be presented and the framing of the proposals, are developed. The proposed model of executives' commitment to information security is an interaction model (in addition to the cost of a security solution, and the risk and the potential loss of a security threat) consisting of the interaction between an executive's preferred subordinate influence approach (PSIA), rational or inspirational, and the framing, positive or negative, of a security proposal. The interaction of these two constructs affects the executive's commitment to an information security proposal. The model i…
Depletion of cytosolic GSH decreases the ATP levels and viability of synaptosomes from aged mice but not from young mice
1995
The effect of glutathione depletion on the viability of freshly isolated synaptosomes from whole brain was investigated in young and aged mice. Aging did not influence the GSH and ATP levels and the viability of these synaptosomes. However depletion of glutathione caused by the cytosolic glutathione inhibitor diethyl maleate (1 mM) resulted in a significant decline, after 60 min of incubation, in ATP levels and viability in the synaptosomes from aged mice but not in those from young mice. When synaptosomes were incubated in the presence of the mitochondrial glutathione inhibitor ethacrynic acid (0.2 mM) there was a similar decline in glutathione, ATP levels and synaptosomal viability, both …
Navigating efficiency and effectiveness relationships across local government services: Another step toward strategic resource management
2013
A major part of maintaining a well-managed performance measurement system in local government is providing the infrastructure for performance management. The problem is that local officials often struggle with moving from adopting performance measures to actually using them for improving services and for making resource allocation decisions. This article responds to this struggle by presenting information on the relationships between efficiency and effectiveness measures across six local government service areas, with the goal of providing guidance on using performance measures to support strategic resource management. Our research suggests that stronger correlations exist between efficienc…
Revenue-Aware Resource Allocation in the Future Multi-Service IP Networks
2006
In the future IP networks, a wide range of different service classes must be supported in a network node and different classes of customers will pay different prices for their used node resources based on their Service-Level-Agreements. In this paper, we link the resource allocation issue with pricing strategies and explore the problem of maximizing the revenue of service providers in a network node by optimally allocating a given amount of node resources among multiple service classes. Under the linear pricing strategy, the optimal resource allocation scheme is derived for the case that no firm Quality-of-Service (QoS) guarantees are required for all service classes, which can achieve the …
Joint Radio and Computational Resource Allocation in IoT Fog Computing
2018
The current cloud-based Internet-of-Things (IoT) model has revealed great potential in offering storage and computing services to the IoT users. Fog computing, as an emerging paradigm to complement the cloud computing platform, has been proposed to extend the IoT role to the edge of the network. With fog computing, service providers can exchange the control signals with the users for specific task requirements, and offload users’ delay-sensitive tasks directly to the widely distributed fog nodes at the network edge, and thus improving user experience. So far, most existing works have focused on either the radio or computational resource allocation in the fog computing. In this work, we inve…