Skip to main content

Rational Social Edge Computing

  • Chapter
  • First Online:
Social Edge Computing

Abstract

With the ever-increasing computing power of edge devices and the growing acceptance of running human-centric learning and intelligence applications on such edge systems, effectively allocating computation tasks to the edge devices has emerged as a critical undertaking for maximizing the performance of SEC systems. Task allocation in SEC faces several unique challenges (e.g., conflicting interests, constrained cooperativeness, dynamic compliance) that are centered around the “rational actor” nature of edge devices. To overcome these challenges, this chapter reviews a novel game-theoretic task allocation framework: Cooperative-Competitive Game-theoretic Task Allocation (CoGTA). The CoGTA framework includes a dynamic feedback incentive scheme, a decentralized fictitious play design with a new negotiation scheme, and a judiciously designed private payoff function.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Note that in the real-time system community, tasks are periodically initialized while jobs are instances of tasks. We choose to follow the nomenclature used in the distributed system community for the words job and task, i.e., jobs are entities containing tasks. Thus, we say that jobs (and the tasks in the jobs) are periodically initialized.

  2. 2.

    The CoGTA framework can be readily extended to more complicated energy models, e.g., supporting multiple voltage/frequency levels. The details are omitted due to the page limit.

References

  1. H. Ackermann, H. Röglin, B. Vöcking, Pure Nash equilibria in player-specific and weighted congestion games, in WINE (Springer, 2006), pp. 50–61

    Google Scholar 

  2. A. Allavena, D. Mossé, Scheduling of frame-based embedded systems with rechargeable batteries, in Workshop on Power Management for Real-time and Embedded systems (in conjunction with RTAS 2001) (2001)

    Google Scholar 

  3. U. Berger, Brown’s original fictitious play. J. Econ. Theory 135(1), 572–578 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  4. E. Campos-Nañez, A. Garcia, C. Li, A game-theoretic approach to efficient power management in sensor networks. Oper. Res. 56(3), 552–561 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  5. N. Cesa-Bianchi, G. Lugosi, Prediction, Learning, and Games (Cambridge University Press, 2006)

    Google Scholar 

  6. L. Chen, S. Zhou, J. Xu, Computation peer offloading for energy-constrained mobile edge computing in small-cell networks. Preprint. arXiv:1703.06058 (2017)

    Google Scholar 

  7. A. Davare, J. Chong, Q. Zhu, D.M. Densmore, A.L. Sangiovanni-Vincentelli, Classification, customization, and characterization: Using milp for task allocation and scheduling. Systems Research (2006)

    Google Scholar 

  8. J. Dean, S. Ghemawat, Mapreduce: simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)

    Article  Google Scholar 

  9. W. Gao, Opportunistic peer-to-peer mobile cloud computing at the tactical edge, in Military Communications Conference (MILCOM), 2014 IEEE (IEEE, 2014), pp. 1614–1620

    Google Scholar 

  10. A. Ghasemi, E.S. Sousa, Opportunistic spectrum access in fading channels through collaborative sensing. JCM 2(2), 71–82 (2007)

    Article  Google Scholar 

  11. K. Habak, M. Ammar, K.A. Harras, E. Zegura, Femto clouds: Leveraging mobile devices to provide cloud service at the edge, in 2015 IEEE 8th International Conference on Cloud Computing (CLOUD) (IEEE, 2015), pp. 9–16

    Google Scholar 

  12. A. Kulkarni, M. Can, B. Hartmann, Collaboratively crowdsourcing workflows with turkomatic, in Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (2012), pp. 1003–1012

    Google Scholar 

  13. D. Liu, L. Khoukhi, A. Hafid, Decentralized data offloading for mobile cloud computing based on game theory, in 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) (IEEE, 2017), pp. 20–24

    Google Scholar 

  14. V. Mahadevan, W. Li, V. Bhalodia, N. Vasconcelos, Anomaly detection in crowded scenes, in 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (IEEE, 2010), pp. 1975–1981

    Google Scholar 

  15. M.-A. Messous, H. Sedjelmaci, N. Houari, S.-M. Senouci, Computation offloading game for an UAV network in mobile edge computing, in 2017 IEEE International Conference on Communications (ICC) (IEEE, 2017), pp. 1–6

    Google Scholar 

  16. J. Redmon, S. Divvala, R. Girshick, A. Farhadi, You only look once: Unified, real-time object detection, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2016), pp. 779–788

    Google Scholar 

  17. M. Satyanarayanan, P. Bahl, R. Caceres, N. Davies, The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14 (2009)

    Google Scholar 

  18. W. Shi, J. Cao, Q. Zhang, Y. Li, L. Xu, Edge computing: Vision and challenges. IEEE Internet of J. 3(5), 637–646 (2016)

    Google Scholar 

  19. H. Tan, Y. Zhai, Y. Liu, M. Zhang, Fast anomaly detection in traffic surveillance video based on robust sparse optical flow, in 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (IEEE, 2016), pp. 1976–1980

    Google Scholar 

  20. W.E. Walsh, M.P. Wellman, A market protocol for decentralized task allocation, in International Conference on Multi Agent Systems, 1998. Proceedings (IEEE, 1998), pp. 325–332

    Google Scholar 

  21. G. Wei, A.V. Vasilakos, Y. Zheng, N. Xiong, A game-theoretic method of fair resource allocation for cloud computing services. J. Supercomput. 54(2), 252–269 (2010)

    Article  Google Scholar 

  22. D. Wicke, D. Freelan, S. Luke, Bounty hunters and multiagent task allocation, in Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems (International Foundation for Autonomous Agents and Multiagent Systems, 2015), pp. 387–394

    Google Scholar 

  23. Y. Zhang, A cross-site study of user behavior and privacy perception in social networks. Master’s thesis, Purdue University, 2014

    Google Scholar 

  24. W. Zhang, E. Bai, H. He, A.M. Cheng, Solving energy-aware real-time tasks scheduling problem with shuffled frog leaping algorithm on heterogeneous platforms. Sensors 15(6), 13778–13804 (2015)

    Article  Google Scholar 

  25. D.Y. Zhang, C. Zheng, D. Wang, D. Thain, X. Mu, G. Madey, C. Huang, Towards scalable and dynamic social sensing using a distributed computing framework, in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (IEEE, 2017), pp. 966–976

    Google Scholar 

  26. D.Y. Zhang, Y. Ma, Y. Zhang, S. Lin, X.S. Hu, D. Wang, A real-time and non-cooperative task allocation framework for social sensing applications in edge computing systems, in 2018 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS) (IEEE, 2018), pp. 316–326

    Google Scholar 

  27. D.Y. Zhang, Y. Ma, C. Zheng, Y. Zhang, X.S. Hu, D. Wang, Cooperative-competitive task allocation in edge computing for delay-sensitive social sensing, in 2018 IEEE/ACM Symposium on Edge Computing (SEC) (IEEE, 2018), pp. 243–259

    Google Scholar 

  28. Q. Zhu, H. Zeng, W. Zheng, M.D. Natale, A. Sangiovanni-Vincentelli, Optimization of task allocation and priority assignment in hard real-time distributed systems. ACM Trans. Embedded Comput. Syst. (TECS) 11(4), 85 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Wang, D., Zhang, D.‘. (2023). Rational Social Edge Computing. In: Social Edge Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-26936-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-26936-3_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-26935-6

  • Online ISBN: 978-3-031-26936-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics