计算机科学 ›› 2014, Vol. 41 ›› Issue (5): 150-154.doi: 10.11896/j.issn.1002-137X.2014.05.032
肖迎春,王汉武,李梦雄
XIAO Ying-chun,WANG Han-wu and LI Meng-xiong
摘要: 针对组合双向拍卖中节点或实体在单次拍卖中分别扮演资源提供者和资源需求者时所具有的不同特点,提出了混合组合双向拍卖模式,即在拍卖中节点本身不单是资源提供者同样也是资源需求者。在此前提下,结合信任度在资源分配安全性以及服务质量方面的作用,将信任度引入到定价调整中,从而优化资源的分配。仿真实验结果表明,所提出的资源分配方法在提高拍卖效率和单位效用正向激励以及防止恶意节点方面均优于已有方案。
[1] Wang X Y,Wang X W,Huang M.A Double Auction Method for Resource Management and Bidding Strategy on Grid Resources[C]∥2010IEEE Fourth International Conference on Genetic and Evolutionary Computing.2010:422-425 (下转第172页)(上接第154页) [2] Zhao L Y,Liu F.Service-oriented Pricing and Resource Allocation in Grid Computing Environment[C]∥2011International Conference on Electronic & Mechanical Engineering and Information Technology.2011:3927-3930 [3] Schneider S,Shabalin P,Bichler M.On the robustness of non-linear personalized price combinatorial auctions[J].European Journal of Operational Research,2010(206):248-259 [4] Christopher T,Parkes C.Cryptographic combinatorial securities exchanges[C]∥The 13th International Conference on Financial Crypto-graphy and Data Security,Feb 2326,2009.Accra Beach,Barbados:Springer Verlag,2009:285-304 [5] Xia M,Stallaert J,Whinston A B.Solving the combinatorialdouble problem[J].European Journal of Operational Research,2005,164(1):239-251 [6] Ma J,Orgun M A.Trust management and trust theory revision [J].IEEE Trans on System,Man and Cybernetics Parta:System and Human,2006,36(3):451-460 [7] Vijayakumar V,Wahidhabanu R S D.Trust and reputation aware security for resource selection in grid computing [C]∥2008International Conference on Security Technology Procee-dings.Sanya,China,Dec.2008:121-124 [8] Yuan L L,He Z J,Zeng G S.A Resource Trade Model Based on Trust Evaluation for Grid Computing[C]∥IFIP International Conference on Network and Panallel Computing-Workshops.2007:506-511 [9] Li L,Liu Y A,Ma X L.Grid resource allocation based on thecombinatorial double auction[J].Acta Electronica Sinica,2009,37(1):165-169 [10] Yang M,Liu Y A,Ma X L.Research on Grid Resource Allocation Based on Equivalent Price[C]∥ISECS International Colloquium on computing,Communication,Control,and Management.2009:148-152 [11] Wang K,Li L,Hausheer D.A Trust-Incentive-based Combinatorial Double Auction Algorithm[C]∥IEEE/IFIP Network Operations and Management Symposium NOMS 2010:Mini-confe-rence.2010:209-215 [12] Gan Z B,Xiao X L,Li K.A Multi-dimension Trust Risk Evaluation for E-commerce systems[C]∥IEEE,Eighth Web Information Systems and Applications Conference.2011:143-149 [13] Xu X Q,Yang L.A Multi-dimensional and Multi-directionalTrust Model for Federated Identity Management[C]∥International Conference on Instrumentation,Measurement,Computer,Communication and Control.2011:512-515 [14] Li X Y,Zhou F,Yang X D.A multi-dimensional trust evaluation model for large-scale P2P computing[J].J.Parallel Distrib.Comput,2011(71):837-847 |
No related articles found! |
|