Spectrum Trading with Insurance in Cognitive Radio Networks

Size: px
Start display at page:

Download "Spectrum Trading with Insurance in Cognitive Radio Networks"

Transcription

1 212 Proceedngs IEEE INFOCOM Spectrum Tradng wth Insurance n Cogntve Rado Networks Hamng Jn, Gaofe Sun, Xnbng Wang Dept. of Electronc Engneerng Shangha Jao Tong Unversty, Chna Emal: {jnhamng, sgf hb, xwang8}@sjtu.edu.cn Qan Zhang Dept. of Comp. Sc. and Engn HK Unv. of Sc. and Tech., HongKong Emal: qanzh@cs.ust.hk Abstract Market based spectrum tradng has been extensvely studed to realze effcent spectrum utlzaton n cogntve rado networks CRNs). In ths paper, we utlze the concept of nsurance n spectrum tradng so as to mprove spectrum effcency n CRNs. We show that by addtonally purchasng a specfcally desgned nsurance contract from a PU, an SU can mprove ts utlty snce t wll be nsured aganst the potental accdent,.e., transmsson falure ncurred by excessvely low SINR. Therefore nsurance provdes SUs more ncentve to purchase PUs channels and spectrum utlzaton n CRNs can be mproved. In ths paper, the orgnal spectrum market ncludng multple PUs and multple SUs are modeled as a hybrd market consstng of a spectrum market and an nsurance market. In ths hybrd market PUs serve as spectrum sellers as well as nsurers and SUs act as spectrum buyers as well as nsureds. We further model the hybrd market game as a four-stage Bayesan game between PUs and SUs. We characterze the second-best Pareto optmal SBPO) market allocatons and players perfect Bayesan equlbrum PBE) strateges. Furthermore, through extensve smulaton, we have demonstrated that at the PBE, hgh rsk and low rsk SUs wll respectvely experence mprovement n ther utltes for approxmately 23.5% and 4.6%. I. INTRODUCTION Cogntve rado CR) has been regarded as a promsng paradgm to tackle the spectrum scarcty and neffcent spectrum usage n current wreless communcaton networks. CRNs are desgned based on the noton of dynamc spectrum sharng where cogntve rado users have the capablty to opportunstcally share the rado spectrum. Among mechansms for dynamc spectrum sharng, marketdrven spectrum tradng s one of the most commonly utlzed frameworks. In [12], Nyato et al. analyzed the spectrum tradng between multple PUs and SUs. They modeled SUs dynamc and evolutonary behavor as an evolutonary game and the competton among the PUs as a noncooperatve game. In [3], Km et al. studed the prce and qualty compettons of duopoly CRNs. The CRNs were modeled as a duopoly W-F 2. market n whch two wreless servce provders compete for customers and spectra. In [5] and [11], Duan et al. studed under spectrum supply uncertanty the optmal prcng and nvestment of a cogntve moble vrtual network operator C-MVNO). In short-term, a C-MVNO can obtan spectrum opportuntes dynamcally by sensng and leasng the spectrum from the spectrum owner. Ths paper models the spectrum negotaton between C-MVNO and SUs as a Stackelberg game and analyze ts equlbrum propertes. Moreover, the ssue of compettve prcng n CRNs was studed n [9] n whch Nyato et al. modeled the spectrum tradng between PUs and SUs as a Bertrand game and analyzed ts Nash equlbrum. Moreover, aucton based spectrum tradng has also been proved to be an effectve framework for dynamc spectrum sharng and lteratures abound n the realm of spectrum aucton. In [15], Zhou et al. proposed a truthful and computatonally-effcent spectrum aucton mechansm, VER- ITAS. Zhou et al. n [6], proposed TRUST, the frst soluton enablng truthful double spectrum auctons. In [16], Ja et al. showed that the prmary users revenue can be maxmzed by ntroducng a specfcally desgned spectrum aucton framework. In [1], Gao et al. proposed a multauctoneer progressve aucton framework enhancng spectrum effcency n CRNs wth multple PUs and SUs. In [4] and [1], Gopnathan et al. respectvely studed the revenue-maxmzng and strategy-proof aucton mechansm to acheve far and effcent spectrum allocaton. Furthermore, Deek et al. n [2] proposed Topaz, a truthful onlne spectrum aucton desgn to deal wth bd and tme-based cheatng n onlne auctons. In addton, only recently, contract-based dynamc spectrum sharng has also been proved to be a promsng mechansm for spectrum tradng. In [8], Gao et al. characterzed the ncentve compatble and ndvdually ratonal contractual forms for SUs to purchase PUs spectra wth the qualty-prce desgned for ther own types. Furthermore, n [7], Duan et al. modeled the CRNs as a labor market and ncorporated contract theory to resolve the problem of cooperatve relay between PUs and SUs. However, all the aforementoned spectrum tradng mechansms fal to consder the ncentves for SUs to purchase PUs channels n the scenaro where SUs face potental transmsson falures. Under such crcumstances spectrum effcency wll thus be undermned n that SUs may not have enough ncentves to purchase PUs channels. Therefore, n ths paper, we seek to mprove spectrum effcency n CRNs by ncorporatng nsurance mechansm nto spectrum tradng. Insurance theory has been wdely studed n the realm of economy. In [17], Clarke studed the duty of good fath n the law of desgnng nsurance contracts. Moreover, Schller n [18] proposed that a sem-separatng equlbrum may occur n nsurance markets where msrepresentaton takes the form of fraudulent clamng. In our framework, both PUs and SUs possess double denttes that s PUs serve as spectrum sellers as well as nsurers and SUs act as spectrum /12/$ IEEE 241

2 buyers as well as nsureds. Facng the nsurance contracts offered by PUs, any arbtrary SU determnes whether to smply purchase a channel or meanwhle sgns an nsurance contract wth the PU to obtan nsurance for the potental accdent,.e., transmsson falure ncurred by the excessvely low SINR. In ths paper, we model the market game as a four-stage Bayesan game and characterze the second-best Perato optmal allocatons SBPO) and the perfect Bayesan equlbrum PBE). Spectrum utlzaton s shown to be mproved by ntroducng nsurance mechansm nto spectrum tradng and both PUs and SUs wll experence ncrease n ther utltes at the PBE. The contrbutons of ths paper are demonstrated as follows: We show that by utlzng nsurance mechansm n spectrum tradng spectrum effcency n CRNs, where SUs face potental transmsson falures, can be mproved. Furthermore, we model the market game between PUs and SUs as a hybrd market and characterze the SBPO market allocatons, the PBE contractual forms and players PBE strateges. Moreover, we derve the condtons for the exstence of the PBE. We analyze the nformaton asymmetry between PUs and SUs about SUs rsk types and study the effect of PUs stochastc rsk verfcaton on SUs rsk type cheatng. Through extensve smulaton, we have demonstrated that at equlbrum, both hgh rsk and low rsk SUs wll respectvely experence an mprovement n ther utltes for approxmately 23.5% and 4.6%. The rest of ths paper s organzed as follows: n Secton II, we ntroduce the network model, hybrd market structure and elements of the PBE. In Secton III, we characterze the SBPO market allocatons. In Secton IV, we derve the condtons for the exstence of the PBE and characterze the PBE contractual forms and players PBE strateges. In Secton V, we provde the numercal and smulaton results and n Secton VI, we dscuss the conclusons and the future work. II. NETWORK MODEL, HYBRID MARKET STRUCTURE A. Network Model AND PBE ELEMENTS We consder a CR network ncludng one prmary operator PO), multple PUs and multple SUs. The PO can be an access pont or a base staton. Any SU s a dedcated transmtter-recever par, Tx -Rx and we denote the set of SUs as {Tx k -Rx k } n k=1. We assume that SU transmtters always have packets to send to ther dedcated recevers. Moreover, such transmsson can be carred out only when an SU has successfully purchased a channel from a PU. The network model s demonstrated n Fgure 1. SUs n ths network are heterogeneous n terms of ther dstances d from the PO. Wthn any arbtrary tme slot, we use fd) to denote the p.d.f. of the dstance between an SU and the PO. The specfc expresson of fd) s determned by SUs moblty model. For example, f SUs move accordng to the restrcted moblty model n [14], fd) s exponentally decayng. Then, we defne the type of an SU n Defnton 1. Insurance Contract 1 SU4 Insurance Contract 2 SU3 SU2 PU2 PU1 Successful Transmsson SU7 PO Faled Transmsson Fg. 1. Illustraton of Network Model: SUs 1 and 2 belong to type-1, SUs 3, 4 and 5 belong to type-2 and SUs 6 and 7 belong to type-3. Due to nterference from the PO, transmsson from SU Txes 1, 2 and 5 to ther RXes fal. PUs 1, 2 and 4 propose nsurance contract 1 and PUs 3 proposes nsurance contract 2. Defnton 1. We draw q concentrc crcles centered at the PO respectvely wth raduses r 1 < < r q, and we call SU a type-j SU f, n the current tme slot, SU locates n the j 1)th j 2) annulus,.e., r j 1 < d < r j and type-1 SU, f t s wthn the nnermost crcular regon wth r n beng the PO s maxmum nterference dstance. Hence, the probablty for an SU to be a type-j j 2) SU s β j = r j r j 1 fx)dx and type-1 SU β 1 = r j fx)dx. The SINR at SU recever wth SU transmtter and SU recever respectvely locatng at pont Xt and X r s: SU1 PU3 PU4 γ = P κ X t X r α I PO + I PU + σ2 We assume that the transmsson power of SU transmtter P, the path loss factor L X t, X r ) = κ X t X r α, the nose varance σ 2 and I PU are approxmately dentcal among all SUs. Hence, nterference s prmarly ncurred by the PO. Therefore, the dstance between SU and the PO dfferentates the SUs n that IPO s determned by d. Furthermore, we assume that SUs of the same type have approxmately the same SINR at ther SU recevers. Furthermore, we assume that SUs n ths network carry out packet-based transmsson. When, for any arbtrary type-j SU, γ j falls below a certan threshold γ th, the transmsson from the SU transmtter to the SU recever wll fal because, n ths scenaro, the partcular SU recever wll be unable to decode the packets transmtted by ts transmtter due to excessvely low SINR. Hence, the accdent probablty,.e., the probablty of faled transmsson for any arbtrary type-j SU can be denoted as ξ j = φγ j ) satsfyng that φ ) s strctly monotoncally decreasng wth range, 1). Apparently, we have < ξ j < ξ j 1 < 1 j 2). In ths paper, we consder the scenaro wth acknowledgement of successful transmsson that s f and only f an SU recever successfully receves and decodes the packets sent by ts dedcated transmtter, t sends a feedback sgnal, ACK SU5 SU6 1) 242

3 to ts transmtter. Thus, based on the presence or absence of the ACK sgnal, the partcular SU transmtter wll be able to decde whether the current transmsson s successful. In ths network, SU transmtters send dentcal number of packets denoted by P S n the case of successful transmsson. The prmary network conssts of m PUs and one PO. We assume that PUs always have dle spectra to trade wth SUs and the PO serves as the nterface of the spectrum tradng and nsurance contract sgnng between PUs and SUs. In ths paper, we assume that the PO possesses the locaton nformaton of SUs n the local area and charge c for each consultaton of ths nformaton ssued by a PU. The analyss of the strategc behavor of the PO s beyond the scope of ths paper. Our results n ths paper can be extended to the scenaro of largescale wreless sensor networks as specfed n [13]. B. Hybrd Market Structure The hybrd market conssts of a spectrum market and an nsurance market. PUs and SUs n ths market have double denttes that s PUs serve as spectrum sellers as well as nsurers and SUs act as spectrum buyers as well as nsureds. Apart from the prce of ts channels τ, any arbtrary PU offers a menu of nsurance contracts w.r.t. dfferent types of SUs.e., C = C 1,, C q). We assume that all PUs sell channels at dentcal prce τ = τ, {1,, m}. The channels sold by PUs expre after one tme slot and PUs can resell these channels f they are stll dle n the next tme slot. SUs can purchase only one channel and sgn one nsurance contract at the begnngng of every tme slot. In every tme slot, enlghtened by [18], [19] and [2] we model the market game as a four-stage Bayesan game. Stage I Insurance contract proposng) Each PU accesses the PO and proposes a menu of nsurance contracts C = C 1,, C q ). Stage II Channel purchasng and contract sgnng) SUs access the PO to obtan the channel prcng and nsurance contracts nformaton. If an SU decdes to sgn an nsurance contract, t meanwhle purchases a channel sold by the same PU. Otherwse, the SU stochastcally purchases a channel from one of the PUs. Stage III Data transmsson and clam flng) SUs carry out data transmsson from SU transmtters to SU recevers. If the transmsson fals, the SU then fles a clam for ndemnty to ts nsurer through the PO f t has sgned an nsurance contract wth the PU n stage II. Stage IV Audtng and ndemnty payng) When PU receves a clam for ndemnty, t conducts rsk verfcaton of the SU wth probablty p [, 1] by consultng the PO the locaton nformaton of the SU. The PU can then determne whether ths SU has cheated on ts rsk types and has selected an nsurance contract desgned for other SU types. If no rsk type cheatng s establshed, the PU pays the ndemnty to the SU. Otherwse, t rescnds the contract and pays no ndemnty. In Defnton 2, we defne the form of nsurance contracts. Defnton 2. An nsurance contract Cj proposed by PU to type-j SUs has the form of Cj = λ j, θ j ) n whch λ j represents the nsurance premum, θj the net payoff n the case of an accdent and therefore the total ndemnty λ j + θ j. For smplfcaton of analyss, n ths paper, we dwell on the scenaro where only two categores of SUs, namely typeh and type-l, respectvely denotng SUs wth hgh and low accdent probablty, exst n ths network. We dvde the regon nsde the PO nterference crcle nto two parts.e., the nner crcular regon, A 1 = { } X < X X PO r th and the outer annulus, A 2 = { } X r th X X PO r max, wth X denotng the poston of any arbtrary pont, X PO the poston of the PO, r th the threshold radus and r max the PO s maxmum nterference dstance. Snce SUs n regon A 1 suffer from hgher level of nterference from the PO than those n regon A 2, we denote the former type of SUs type-h SUs and the latter type-l SUs, respectvely wth accdent probablty ξ h = φγ h ) and ξ l = φγ l ) such that < ξ l < ξ h < 1. The probablty for an SU to be type-h and type-l are respectvely β h = A 1 fx) = r th fx)dx and β l = A 2 fx) = rmax r th fx)dx. Hence, approxmately we have β h + β l = 1. In ths paper, we consder an nsurance market wth nformaton asymmetry and costly rsk verfcaton. SUs have prvate knowledge of ther rsk types that are not avalable to PUs unless they carry out rsk verfcaton. PUs are charged for c by the PO for each rsk verfcaton. It s necessary for PUs to verfy SUs rsk levels because n nsurance markets one gst of nsurance contract desgn s to charge more premum for nsureds wth hgher rsk. Hence, type-h SUs have ncentve to msrepresent ther rsk types and sgn the contracts desgned for type-l nsureds to pay less nsurance premum. For example, when SUs are offered actuarally far full nsurance contracts.e., C h = {λ h, θ h } = {ξ h L, L ξ h L} for typeh SUs and C l = {λ l, θ l } = {ξ l L, L ξ l L} for type-l SUs, wth L denotng an SU s loss ncurred by an accdent, snce ξ l L < ξ h L, t s possble that a type-h SU chooses C l. For the same reason, PUs only carry out rsk verfcaton for alleged type-l clamants. For the costly nature of audton, there s an nherent trade-off between the avodance of payng ndemnty wth the payment of audton cost. Thus, each PU audts stochastcally type-l clamant wth probablty p [, 1]. C. Elements of the four-stage Bayesan game In ths subsecton, we defne the basc elements of ths four-stage Bayesan game ncludng players strateges, belefs, utlty functons and PBE condtons. In Defntons 3 and 4, we respectvely defne players strateges and belefs. Defnton 3. PUs strategy profle s defned as { C, p ) } wth C = C 1,, C m ) and p ) = p 1 ),, p m ) ) where C = Ch, C l ) s the contract menu proposed by PU and p C) s ts audton probablty gven contract profle C. Moreover, the strategy of a type-k SU s defned as π k ) = π kh ), πkl ),, πm kh ), πm kl )) n whch πkj C) denotes the probablty that gven C, a type-k SU sgns nsurance contract Cj f 1 and sgns no nsurance contract f = 243

4 such that m = π kh + π kl ) = 1 and k, j {h, l}. Therefore, the overall strategy profle s { C, p ), π h ), π l ) }. Defnton 4. The belef profle s denoted as η ) = η1 ),, η m ) ) n whch η C) s the probablty n PU s belef that a Cl clamant s n fact type-h gven the contract profle C. Moreover, η C) s calculated through Bayes law: η C) = β h ξ h π hl C) β h ξ h π hl C) + 1 β h)ξ l π ll C), s.t. π hlc) + π llc) >, {1,, m} In defnton 5 and 6, we defne players utlty functons. Defnton 5. 3)-7) hold for {,, m}. The expected utlty of an SU that purchases an nsurance contract desgned for ts own type s: R kk C k) =1 ξ k )ru S τ λ k ) + ξ kru F τ + θ k ), s.t. k {h, l} The expected utlty of a type-h SU that purchases C l s: R hl C l, p ) 2) 3) =ξ h 1 p )ru S τ + θ l ) + p ru F τ) ) + 1 ξ h )ru S τ λ l ) 4) The expected utlty of a type-l SU that purchases C h s: R lh C h ) =1 ξ l )ru S τ λ h) + ξ l ru F τ + θ h) The expected utlty of a type-l SU s: Λ l C, πl ) ) m = π lh C)R lh Ch ) + π ll C)R llcl )) 6) = The expected utlty of a type-h SU s: Λ h C, p ), πh ) ) m = πhh C)R hhch ) + π hl C)R hl C l, p C) )) 7) = In 3)-5), U S = P S denotes the successful transmsson reward whch we assume s lnearly related wth P S, the number of packets receved by the SU recever and U F denotes the transmsson reward n the case of an accdent whch s approxmately. Hence, an SU s loss ncurred by an accdent s L = U S τ) U F τ). Moreover, r ) satsfes that r ) > and r ) < and C h = C l =, ) represent the case n whch the SU remans unnsured. Defnton 6. 8)-12) hold for {1,, m}. The expected proft of PU for contract C h s: 5) G hk C h) = 1 ξ k )λ h ξ k θ h, k {h, l} 8) PU s expected proft for C l sgned by a type-l SU s: G ll C l, p ) = 1 ξ l )λ l ξ l θ l + p c) 9) PU s expected proft for C l sgned by a type-h SU s: G lh C l, p ) = 1 ξ h )λ l ξ h 1 p )θ l + p c ) 1) PU s expected utlty from an nsurance contract s: Φ C, p ), πh ), π l ) ) =β h π hh C)G hhc h ) + π hl C)G lh C l, p C) )) + β l π lhc)g hl C h) + π llc)g ll C l, p C) )) 11) PU s expected utlty gven that t has sold M channels and N nsurance contracts such that M N s: Ω C, p ), πh ), π l ), M, N ) =Mτ + NΦ C, p ), πh ), π l ) ) 12) The rest of ths paper seeks to characterze the equlbrum of ths four-stage Bayesan game. Such an equlbrum s a perfect Bayesan equlbrum formally defned n Defnton 7. Defnton 7. E = { C, p ), πh ), π l ), η )} s a perfect Bayesan equlbrum of the four-stage Bayesan game f t satsfes: Λ h C, p ), π h ) ) Λ h C, p ), π h ) ), π h ), C 13) Λ l C, πl ) ) Λ l C, π l ) ), π l ), C 14) The followng 15)-17) hold for {1,, m}: p C) η C)θl c ) p C) η C)θl c ), p ), C 15) Ω C, C ), p ), πh ), πl ), M, N ) Ω C, p ), πh ), π l ), M, N), C = Ch, ) 16) C l η C) = β h ξ h πhl C) β h ξ h πhl C) + 1 β h)ξ l πll C. 17) C), 13) holds for π h ) and C conveyng that πh ) s the optmal contract choce for type-h SUs gven PUs audtng strateges p ). Smlarly, holdng for π l ) and C, 14) reveals the optmalty of πl ) among type-l SUs contract selecton strateges. 15) means for C, p ) s the optmal audton strategy for PU gven ts belef η C). 16) says gven other PUs contract profle C = C1,, C 1, C +1,, C m ), C s the optmal contract offer for PU and 17) states that η ) can be calculated from πh ) and π l ) by Bayesan law. Hence, the PBE strategy profle { C, p ), πh ), π l )} satsfes sequental ratonalty gven η ). III. CHARACTERIZATION OF SECOND-BEST PARETO OPTIMAL SBPO) ALLOCATIONS In ths secton, we characterze the PBE of ths four-stage Bayesan game by delvng nto ts SBPO allocatons. For any strategy profle, { C, p ), π h ), π l ) }, a market allocaton s defned as {C, p, π h, π l } wth p = pc), π h = π h C) and π l = π l C). In ths paper, we defne Pareto optmalty n second-best sense because of the constrants ntroduced n C 1 later ths secton. Then, we ntroduce Lemmas 1 and 2 that shed lght upon several basc propertes of the PBE. 244

5 Lemma 1. For PBE E = { C, p ), πh ), π l ), η )}, such that πhl C) + π ll C) >, C, we have p C) < 1 and p C) η C)θ l c) =. Furthermore, f πhl C) = and πll C) >, then we have p C) =. Proof: Suppose that p C) = 1, we have R hl C l, 1) =ξ h ru F τ) + 1 ξ h )ru S τ λ l ) <ξ h ru F τ) + 1 ξ h )ru S τ) =R hh C h ) Hence, we also have πhl =. Then 17) gves η C) = and η C)θ l = < c. Therefore, p C) = accordng to 15), whch contradcts wth the assumpton that p C) = 1. Thus, p C) < 1. From 15), we have p C) η C)θ l c) =. Specfcally, for the case that πhl C) = and π ll C) >, we have η C) = and p C) = from 15) and 17). Remarks. Lemma 1 conveys that every PU carres out stochastc audton at PBE.e., p C) < 1. Ths s somewhat ntutve because when rsk verfcaton s carred out by PU wth probablty 1, type-h SUs wll be better off to reman unnsured or sgn nsurance contracts other than Cl. Furthermore, ths n turn ndcates that audton s unnecessary,.e., p C) =. Moreover, audton s conducted wth postve probablty only when η C) reaches a threshold c. θl Lemma 2. The proft of nsurance contract Cl for any PU at PBE E = { C, p ), πh ), π l ), η ) } can be represented by SUs contract choces πhl and πll wthout explctly ncorporatng PU s audton probablty p C). Proof: From Lemma 1, we know that p C) η C)θ l c ) =, p C) < 1 and PUs are ndfferent about whether to carry out rsk verfcaton or not. Hence, we have β h πhl C)G lh C l, p C)) + β l πll G ll C l, p C)) =β h πhlc)g lh Cl, ) + β l πll G ll Cl, ) =β h πhl C)G lh C l ) + β lπll G ll C l ) Therefore, we have proved Lemma 2. Then, n C 1 we ntroduce the constrants that SBPO allocatons have to satsfy n ths Bayesan game. Such constrants nclude nformaton asymmetry between SUs and PUs about SUs rsk types shown n 21) and 22) and no pre-commtment of PUs audton strateges demonstrated n 18) and 19). Furthermore, 2) requres that the expected proft that PU can get by proposng an nsurance contract should be no smaller than ω, because otherwse PUs wll have no ncentve to propose nsurance contracts. If an allocaton {C, p, π h, π l } satsfes constrant C 1, we call t a feasble allocaton. C 1 : A feasble allocaton {C, p, π h, π l } should satsfy the followng constrants for {1,, m} and C. βh ξ h πhl + 1 β h )ξ l πll ) c = βh ξ h πhlθ l, f p > 18) βh ξ h πhl + 1 β h )ξ l πll ) c βh ξ h πhlθ l, f p = 19) Φ C, π h, π l ) =1 β h ) π lhc)g hl C h) + π llc)g llc l) ) + β h π hh C)G hh C h ) + π hl C)G lh C l )) ω 2) Λ h C, p, π h ) = max { R hh C h ), R hlc l, p ) {1,, m} } 21) Λ l C, p, π l ) =max { R lh Ch ), R llcl 22) ) {1,, m}} Then n Defnton 8, we defne SBPO market allocatons. Defnton 8. An allocaton {C, p, π h, π l } that satsfes C 1 s an SBPO allocaton f no other feasble allocaton {C, p, π h, π l } exsts satsfyng that: Λ k C, p, π k ) Λ kc, p, π k ), k {h, l} 23) In the followng analyss, we characterze SBPO allocatons by consderng a seres of constraned optmzaton problems from O 1 to O 3. Frstly, we consder problem O 1. O 1 β h, c, ν, ω 1,, ω m ): {Ĉ, p, π h, π l } = arg maxλ l C, π l ), s.t. C 1 β h, c, ω 1,, ω m ) and Λ h Ĉ, p, π h) ν 24) The soluton of O 1 β h, c, ν, ω 1,, ω m ) sheds lght upon the characterzatons of the SBPO allocatons of the four-stage Bayesan game because any SBPO allocaton {C, p, π h, π l } s n fact an optmal soluton to O 1 β h, c, ν,,, ) satsfyng that ν = m =1 πhh C)R hhch ) + π hl C)R hl C l, p C) )). To analyze O 1, frstly we study the symmetrc varant of O 1.e., O 2 β h, c, ν, ω ) = O 1 β h, c, ν, ω 1,, ω m ) 1 m ω =ω. In O 2 PUs offer the same contract menu.e., C = C l, C h ) and audt SUs rsk types wth the same audtng probablty. Moreover, SUs are evenly dstrbuted among PUs. Then, n Theorems 1-4, we provde our results about the characterzatons of the SBPO allocatons of ths four-stage Bayesan game. We use { C, ṗ, π h, π l } to denote the optmal soluton for O 2 β h, c, ν, ω ). In ths paper, we restrct our analyss on the case where ṗ >. Smlar conclusons exst when ṗ =. Theorem 1. For { C, ṗ, π h, π l } such that ṗ >, SUs contract selecton strategy satsfes π ll = 1, π lh =, π hh = 1 π hl and 25), π hl = B θ l, β h, c) = 1 β h)ξ l c β h ξ h θ, 1) 25) l c) Proof: We denote the value functon of the constraned maxmzaton problem O 2 β h, c, ν, ω ) as ψ 2 β h, c, ν, ω ) and we denote O 2 β h, c, ν, ω ) under scenaros such that ṗ > and ṗ = as O 2 β h, c, ν, ω ) and O 2 β h, c, ν, ω ) respectvely wth value functon ψ 2 β h, c, ν, ω ) and ψ 2 β h, c, ν, ω ). Therefore, we have ψ 2 β h, c, ν, ω ) = max { ψ 2 β h, c, ν, ω ), ψ 2 β h, c, ν, ω ) }. If for a feasble allocaton Q, π ll < 1, there s another feasble allocaton Q of O 2 β h, c, ν, ω ) such that a type-l SU earns hgher utlty for allocaton Q than Q. Then, we consder allocatons feasble n O 2 β h, c, ν, ω ) wth no counterparts n Q that makes type-l SUs better off. Hence, we have π ll = 1 and π lh =. Snce ṗ >, 18) holds and by some manpulaton we can arrve at the concluson 25). Theorem 2. For { C, ṗ, π h, π l } such that ṗ >, type-h SUs mnmum utlty ν s less than the utlty granted by 245

6 the poolng contract C = ξl + ω, 1 ξ)l ω ), wth ξ = β h ξ h + 1 β h )ξ l and ν = ru S ξ ω ), that s R hh C h ) = R hl C l, ṗ) = ν < ν 26) Proof: Snce Theorem 1 reveals that C l s better off for type-l SU than C h, then we have 27), R ll C l ) R lh C h ) 27) Snce, π ll < 1 and π hl >, we have 28), R hl C l ) = R hl C l, ) > R hh C h ) 28) Moreover, wthout loss of generalty, we also assume 29), R hh C h ) ν 29) Suppose that ν ν, we have π hh R hh C h )+ π hl G lh C l ) < ξ ξ h )L + ω. From 2), we have G ll C l ) > ξ ξ l )L + ω and R ll C l ) < ν < R hl C l, ). Then we construct an allocaton Q 1 = {Ch 1, C1 l, p1, πhh 1, π1 hl, π1 lh, π1 ll } wth p1 =, πhh 1 = 1, π1 hl =, π1 lh =, π1 ll = 1, and C1 h, C1 l ) = C h, C l ). On one hand contract C l satsfes λ l + θ l = L and R llc l ) = R ll C l ) whch reveals that G ll C l ) > G ll C l ) and R hl C l ) > R hl C l ). On the other hand, contract C h satsfes that C h = C h when π hh > and G hh C h ) G lh C l ) and C h = C l when π hh =. Therefore, we have R ll C l ) R llc h ), R hhc h ) > R hl C l ) and R hhc h ) > ν. Then from 2), we have: β h G hh C h) + 1 β h )G llc l) >β h πhh G hh C h ) + π hl G lh C l ) ) + β l G ll C l ) =ω Therefore, we can deduce that allocaton Q 1 s domnated n O 2 β h, c, ν, ω ) because Q 1 s feasble n O 2β h, c, ν, ω ) wth PUs expected proft larger than ω and nsureds expected utlty satsfyng R ll C l ) = R ll C l ). Hence, we have a contradcton and n fact ν < ν. Also, from 21) we can arrve at the concluson that R hh C h ) = R hl C l, ṗ) = ν. Remarks. Theorem 1 conveys that at the optmal soluton to O 2 β h, c, ν, ω ) when ṗ >, type-h SUs randomze between contract C l and C h and selects C l wth probablty B θ l, β h, c). Moreover, the fact that ν < ν reveals that audton s an effectve way to stem type-h SUs from choosng contract C l because as ndcated by Theorem 2, type-h SUs mnmum utlty ν s less than that granted by the poolng contract. Proposton 1. For { C, ṗ, π h, π l } such that ṗ >, contract C l satsfes 3), C l = arg maxr ll C l ), s.t. C l β h B θ l, β h, c) G lh C l ) G hh C h ) ) + G hh C h ) 1 β h )G ll C l ) ω ) + 3) Proof: From Theorem 1, we get π ll = 1, π lh = and 25). We get 3) by substtutng π ll, π lh and π hl n 2). Next, we further characterze the optmal soluton of O 3 β h, c, R hh, ) = O 2 β h, c, ν, ω ) ω= ν = R, whch s also a hh crucal step towards the characterzaton of O 1. R hh denotes a type-h SU s utlty f t sgns an actuarally far full nsurance contract C h.e., Rhh = R hh C h ). Then we have Theorem 3 characterzng the optmal soluton to O 3. Theorem 3. There exst threshold values for PUs audton cost c < c < ) and the probablty that an SUs falls nto the category of type-h SU βh < β h < 1), such that the optmal soluton for O 3, { C, p, π h, π l } satsfes, When c < c < and βh < β h < 1, C = C h, Cl ), π hh = π ll = 1 and π hl = π lh =. When qβ h ) c < and < β h < βh λ, h + θ h = L, λ l + θ l < L, π hh = π ll = 1 and π hl = π lh =. When < c c and βh β h < 1 or < c qβ h ) and < β h < βh C, = C h, C l ), π hl = B θ l, β h, c), π hh = 1 π hl, π ll = 1 and π lh =. where Cl = { } ξ l L, 1 ξ l )L < L < L), curve c = qβ h ) < β h βh ) s shown n Fgure 2 and C l satsfes: C l = argmax R ll C l ), s.t. C l β h B θ l, β h, c)g lh C l) + 1 β h )G ll C 31) l). Proof: By substtutng C h = {ξ h L, L ξ h L} nto 8), we have G hh C h ) =. Together wth ω =, we get condton 31). Then, we denote the value functon of O 3 β h, c, R hh, ) as ψ 3 β h, c, R hh, ) = ψ 2 β h, c, ν, ω ) ω= ν = R. hh If p =, R ll C l ) s contngent merely on the value of β h and thus, n ths scenaro, we can denote that kβ h ) = R ll C l ). Accordng to the Rothschld-Stgltz RS) model [2], a threshold value βh < β h < 1) exsts satsfyng that kβ h) > R ll Cl ) and k β h ) < for β h < βh and kβ h) = R ll Cl ) for βh β h < 1. Snce C l depends only on cost c, we can denote that tc) = R ll C l ) such that t c) <. Accordng to the RS model n [2], a threshold value c < c < ) exsts such that tc) > R ll Cl ) f and only f when < c < c. Based on the aforementoned propertes of kβ h ) and tc), we have: When c < c < and βh < β h < 1, ψ 3 β h, c, R hh, ) = kβ h ) = R ll Cl ) > R ll C l ). When qβ h ) c < and < β h < βh, ψ 3 β h, c, R hh, ) = kβ h ) > max { R ll C l ), R ll Cl ) }. When < c c and βh β h < 1 or < c qβ h ) and < β h < βh, ψ 3 β h, c, R hh, ) = tc) = R ll C l ) > kβ h). Then, together wth Theorems 1 and 2, we get Theorem 3 concernng the optmal soluton of O 3. Remarks. In Theorem 3, we characterze the contract forms and SUs strateges at the soluton to O 3 β h, c, R hh, ). It reveals that threshold values c < c < ) and βh < βh < 1), together wth the functon c = qβ h) dvde the area S = { β h, c) < β h < 1 and < c < } n the c β h plane nto three regons shown n Fgure 2. In regon I and II, the contract forms are specfed n the frst two tems of Theorem 3 and SUs strongly prefer the contacts desgned for ther own rsk types. Hence, audton s not necessary,.e., p =. When β h, c) falls nto regon III, then for PUs the optmal contracts 246

7 Fg. 2. c * c Regon II c= q β h ) β * h Regon I Regon III Illustraton of c β h plane: c and βh are threshold values. are n the form of C = C h, C l ) and audton s conducted wth probablty p >. In ths case, type-l SUs also strongly prefer the contacts desgned for type-l SUs, whereas type-h SUs select C l wth probablty π hl = B θ l, β h, c). After we propose Theorems 1-3, we can characterze the optmal soluton to O 1 β h, c, ν, ω 1,, ω m ) defned n 24). Specfcally, we consder the scenaro where PUs obtan nonnegatve proft that s we consder O 1 β h, c, ν,,, ). Theorem 4. The optmal soluton to O 1 β h, c, ν,,, ) concdes wth the optmal soluton to O 2 β h, c, ν, ) characterzed n Theorems 1-3, that s for {1,, m}, we have Ĉ = C, p = ṗ, π jk = π jk m, j, k {h, l} under the condton that ν R hh where ν denotes type-h nsureds expected utlty.e., ν = Λ hc, p, π h ). Proof: The proof of Theorem 4 s n the appendx. IV. CHARACTERIZATION OF PERFECT BAYESIAN EQUILIBRIUM OF THE FOUR-STAGE BAYESIAN GAME In ths secton, we characterze the equlbrum of the fourstage Bayesan game and restrct our analyss to equlbrum allocatons that are SBPO. A contradcton wth the defnton of equlbrum wll occur f a non-sbpo allocaton s an equlbrum allocaton because any devant PU k wll then be able to offer a contract menu C k = Ch k, Ck l ) such that ths offer s better off to all SUs and PU k makes postve proft. We denote Λ e h and Λe l as the equlbrum expected utlty for type-h and type-l SUs. In C 2 and C 3, we ntroduce two addtonal constrants ncorporated n the followng analyss. C 2 : A PBE E = { C, p ), πh ), π l ), η ) } satsfes C 2 f for the contnuaton sub-game after PUs propose the contract profle C, {p, πh, π l } s a tremblng hand perfect Bayesan equlbrum ntroduced by Selten n [21]. C 3 : A PBE E = { C, p ), πh ), π l ), η )} satsfes C 3 f πl C) = π l C ) such that contract profle C and C dffers only n the contracts strctly domnated for type-l SUs. Then we have Lemma 3 to characterze basc propertes of PBE that satsfes constrant C 2. Lemma 3. We have p = for {1,, m} such that θl = c at any PBE E = { C, p ), πh ), π l ), η )} that satsfes C 2. Proof: We denote Π as the contnuaton subgame after the proposal of C and {p, πh, π l } s a perfect Bayesan 1 βh equlbrum of Π that satsfes C 2. We consder a sequence of perturbed contnuaton subgames {Π εn } n=1 whch converges to Π and the assocated PBE {p n, π hn, π ln, η n } satsfyng that {p n, π hn, π ln } converges to {p, πh, π l }. Then, from Bayes law, we have: ηn = β h ξ h πhln, 1), n. β h ξ h π hln +1 β h)ξ l π lln Maxmzng p ηnθ l c) w.r.t. p [ε n, 1 ε n ] means that f θl = c, n, we have p n = ε n. Therefore, the fact that lm ε n = reveals that p = lm p n =. n n Remarks. Lemma 3 reveals that under constrant C 2, the decrease n the audton probablty of PU s not able to serve as a threat to deter an devant PU to attract type-h SUs. Thus any PBE allocaton falls nto the category of SBPO allocaton, whch s formally proved n Lemma 4. Lemma 4. Any PBE allocaton satsfyng C 2 s SBPO and an optmal soluton to O 1 β h, c, Λ e h,,, ) wth Λe h R hh. Proof: Assume that E = { C, p ), πh ), π l ), η )} s a PBE and ts allocaton {C, p, πh, π l } satsfes C 2. {C, p, πh, π l } s feasble n O 1β h, c, Λ e h, Ωe j,, Ωe j ) wth Ω e denotng the equlbrum expected revenue of PU, for {1,, m}. Snce Ω e, we have {C, p, πh, π l } s also feasble n O 1 β h, c, Λ e h,,, ). Then we also prove ths lemma by contradcton. We assume that ths allocaton does not optmze O 1 β h, c, Λ e h,,, ). We consder a devaton made by PU j from Cj to C j. We denote Ω j as PU j s proft of the contnuaton equlbrum after ts devaton. Hence, Ω j and Ω e j satsfes 15) that s Ω j < Ω e j. In the scenaro where R hl Cj l ) < R hhc j h ), we have πhh C j, C j) = πll C j, C j) = 1 and p j C j, C j) =. Hence, Ω j Ω e j whch contradcts wth Ω j < Ω e j. Also smlar results hold n the case that R hl Cj l ) R hhc j h ). After Lemmas 3 and 4, we are ready to characterze the PBE of ths four-stage Bayesan game satsfyng C 2 and C 3. In Theorem 5, we propose the necessary and suffcent condtons for PBE to exst n ths four-stage Bayesan game. Theorem 5. Under C 2 and C 3 only two types of PBE exst: If and only f < c c and βh β h < 1 or < c kβ h ) and < β h < βh, PBE E 1 exsts at whch PUs propose contract menu C = C l, C h ), {1,, m} and carry out audton wth postve probablty. Type-l SUs strongly prefer C l whereas type-h SUs randomze between C l and C h. If and only f βh < β h < 1 and c < c <, PBE E 2 exsts where PUs propose contract menu C = Cl, C h ), {1,, m} and SUs only select contracts desgned for ther own rsk types. Thus, audton s not necessary,.e., p =. Proof: The proof of Theorem 5 s n the appendx. V. NUMERICAL AND SIMULATION RESULTS In ths secton, we provde our numercal and smulaton results. We demonstrate the exstence of PBE E 1 and E 2 n Fgures 3 and 4. Moreover, n Fgure 5, we demonstrate the comparson of the utlty of an SU wth and wthout nsurance. Wthout loss of generalty we set the smulaton parameters as follows: U S = 6, U F = 2, τ = 1, ξ h =.7 and ξ l =

8 Illustraton of exstence of PBE 1 6 Illustraton of exstence of PBE 2 8 Comparson of an SU s utlty wth and wthout Insurance Y State dependent wealth of an SU Non accdent) Indfference curve of a type h SU Indfference curve of a type l SU Auxlary lne Far odds lne of a type h SU Far odds lne of a type l SU Bsector of the 1st quadrant C D B Y State dependent wealth of an SU Non accdent) Indfference curve of a type h SU Indfference curve of a type l SU Far odds lne of a type h SU Far odds lne of a type l SU Bsector of 1st quadrant C E B The Utlty of an SU % Utlty of an SU wth Insurance Utlty of an SU wthout Insurance 4.7% 4.67% 24.6% A A X State dependent wealth of an SU Accdent) X State dependent wealth of an SU Accdent) Type h SU PBE1 Type l SU PBE1 Type h SU PBE2 Type l SU PBE2 Fg. 3. Illustraton of exstence of PBE 1. Fg. 4. Illustraton of exstence of PBE 2. Fg. 5. Comparson of an SU s utlty wth and wthout nsurance. In Fgure 3, the horzontal axs represents the statedependent wealth of an SU when an accdent does not occur to t and the vertcal axs s the state-dependent wealth of an SU when an accdent happens to ths partcular SU. Pont A59, 1) represents the combnaton of the state-dependent wealth of an SU when t does not purchase any nsurance contract. The dashed lne AC and AB respectvely represents the far odds lne of a type-h SU and a type-l SU. For a type-j SU, ts far, j {l, h}. We notce that for type-h SU one of ts ndfference curves s tangent to ts far-odds lne at pont C18.4, 18.4) whch s the ntersecton of lne AC and the bsector of 1st quadrant. Thus, we have that at PBE E 1 the contract desgned for type-h SU s C h = {4.6, 17.4} = {ξ h L, L ξ h L}. From 28) and 3), we can calculate that contract C l = λ l, θ l ) odds lne goes through pont A59, 1) wth slope ξj 1 ξ j breaks even when λ l =.21θ2 l.49θ l.4c. Next, we set c = 1 and draw an ancllary curve x = 59.21y 1)2.49y 1) 4 shown as the dashed blue curve. As n Fgure 3, we can fnd an ndfference curve for type-l SU tangent to the ancllary curve at pont D37.41, 41.13). At PBE E 1, the nsurance contract desgned for type-l SUs s C l = 21.59, 4.13). Therefore, we have shown the exstence of PBE E 1 n Fgure 3. Smlarly, n Fgure 4, we demonstrate the exstence of PBE E 2. For PBE E 2, we do not need to fnd the pont where one of the type-l SUs ndfference curves s tangent to the ancllary curve n Fgure 3. Snce lne AE, the far odds lne of a type-l SU ntersects wth the ndfference curve of type-h SU at pont B54.56, 11.36), we can conclude that that PBE E 2 exsts and the PBE contracts desgned for type-l SUs and type-h SUs are respectvely Cl = {4.44, 1.36} and C h = {4.6, 17.4}. Moreover, based on the aforementoned results about the contract forms and SUs contract choces at PBE E 1 and PBE E 2. We can calculate the expected utlty of an SU at both PBEs and compare them wth the expected utlty of an SU when nsurance s not ntroduced nto spectrum tradng n CRNs. In Fgure 5, we show the comparson of an SU s expected utlty wth and wthout nsurance. From Fgure 5, we can conclude that the SUs experence ncrease n ther utltes f they choose to purchase nsurance contracts at both PBEs. VI. CONCLUSIONS AND FUTURE WORK In ths paper, we utlze nsurance theory n spectrum tradng n CRNs and model the market game as a four-stage Bayesan game. We show that at PBE, both PUs and SUs wll experence ncrease n ther utltes. Ths ndcates by sgnng nsurance contracts, SUs wll have more ncentves to buy the channels and PUs can make non-negatve proft from every contract t offers. Thus, spectrum utlzaton n CRNs can be mproved. In future work, we am to analyze the scenaro where more than two types of SUs exst and analyze the related equlbrum. We am also to study the case where channels are heterogeneously prced by PUs and study the effects of dfferent channel prcng strateges on the forms of the nsurance contracts. VII. ACKNOWLEDGMENT Ths work s supported by Natonal Fundamental research grant 211CB3271), NSF Chna No ); Chna Mnstry of Educaton New Century Excellent Talent No. NCET-1-58); Chna Mnstry of Educaton Fok Yng Tung Fund No. 1222); Qualcomm Research Grant; Shangha Basc Research Key Project No.11JC1451); Natonal Key Project of Chna 21ZX33-1-1). REFERENCES [1] A. Gopnathan, Z. L, Strategyproof auctons for balancng socal welfare and farness n secondary spectrum markets, n Proceedngs of IEEE INFOCOM, 211,, pp , 1-15 Aprl 211 [2] L. Deek, X. Zhou, K. Almeroth, and H. Zheng, To preempt or not: Tacklng bd and tme-based cheatng n onlne spectrum auctons, n Proceedngs of IEEE INFOCOM 211, pp , Aprl 211. [3] H. Km, J. Cho, K.G Shn, W-F 2.: Prce and qualty compettons of duopoly cogntve rado wreless servce provders wth tmevaryng spectrum avalablty, n Proceedngs of IEEE INFOCOM, 211, pp , 1-15 Aprl 211 [4] A. Gopnathan, Z. L, A pror-free revenue maxmzng aucton for secondary spectrum access, IEEE INFOCOM,, pp.86-9, Aprl 211 [5] L. Duan, J. Huang, B. Shou, Cogntve Moble Vrtual Network Operator: Investment and Prcng wth Supply Uncertanty, n Proceedngs of IEEE INFOCOM, 21,, pp. 1-9, March 21 [6] X. Zhou and H. Zheng, Trust: A general framework for truthful double spectrum auctons, IEEE INFOCOM 29, pp , Aprl

9 [7] L. Duan, L. Gao, and J. Huang, Contract-based cooperatve spectrum sharng, n IEEE DySPAN, 211, pp , 211. [8] L. Gao, X. Wang, Y. Xu, Q. Zhang, Spectrum Tradng n Cogntve Rado Networks: A Contract-Theoretc Modelng Approach, IEEE Journal on Selected Areas n Communcatons,, pp , Aprl 211 [9] D. Nyato, E. Hossan, Compettve Prcng for Spectrum Sharng n Cogntve Rado Networks: Dynamc Game, Ineffcency of Nash Equlbrum, and Colluson, IEEE Journal on Selected Areas n Communcatons,vol.26, no.1, pp , Jan. 28 [1] L. Gao, Y. Xu, X. Wang, MAP: Multauctoneer Progressve Aucton for Dynamc Spectrum Access, IEEE Transactons on Moble Computng, vol. 1, no. 8, pp , Aug. 211 [11] L. Duan, J. Huang, B. Shou, Investment and Prcng wth Spectrum Uncertanty: A Cogntve Operators Perspectve, IEEE Transactons on Moble Computng, vol. 1, no. 11, pp , Nov. 211 [12] D. Nyato, E. Hossan, Z. Han, Dynamcs of Multple-Seller and Multple-Buyer Spectrum Tradng n Cogntve Rado Networks: A Game-Theoretc Modelng Approach, IEEE Transactons on Moble Computng. vol.8, no.8, pp , Aug. 29 [13] Y. Lu, K. Lu, M. L, Passve Dagnoss for Wreless Sensor Networks, IEEE Transactons on Networkng TON), vol. 18, no. 4, pp , Aug. 21 [14] M. Garetto and E. Leonard, Restrcted moblty mproves delaythroughput tradeoffs n moble ad hoc networks, IEEE Transactons on Informaton Theory, vol. 56, no. 1, pp , Oct. 21. [15] X. Zhou, S. Gandh, S. Sur, and H. Zheng, Ebay n the sky: strategyproof wreless spectrum auctons, n Proceedngs of the 14th ACM nternatonal conference on Moble computng and networkng, 28. [16] J. Ja, Q. Zhang, Q. Zhang, and M. Lu, Revenue generaton for truthful spectrum aucton n dynamc spectrum access, n Proceedngs of the tenth ACM nternatonal symposum on Moble ad hoc networkng and computng. pp. 3 12, 29. [17] M. Clarke, and G. Légste, The law of nsurance contracts. Lloyd s of London Press, [18] J. Schller, The mpact of nsurance fraud detecton systems, Journal of Rsk and Insurance, vol. 73, no. 3, pp , 26. [19] P. Pcard, Costly rsk verfcaton wthout commtment n compettve nsurance markets, Games and Economc Behavor, pp , 29. [2] M. Rothschld and J. Stgltz, Equlbrum n compettve nsurance markets: An essay on the economcs of mperfect nformaton, The Quarterly Journal of Economcs, vol. 9, no. 4, pp , [21] R. Selten, Reexamnaton of the perfectness concept for equlbrum ponts n extensve games, Internatonal journal of game theory, A. Proof of Theorem 4 APPENDIX Proof: We denote ψ 1 β h, c, ν, ) as the value functon of O 1 β h, c, ν,,, ). Also, we denote ψ 2 β h, c, ν, ) as the value functon of O 2 β h, c, ν, ω ) wth ω = and 2) s changed from nequalty to equalty. We denote βh as the fracton of type-h SUs among SUs that buy PU s nsurance. When ν > R hh From 2) and condton Λ h Ĉ, p, π h) ν n 24), we have β < 1. From the defntons of ψ 2 and ψ 2, we get ψ 2 β h, c, ν, ) ψ 1β h, c, ν, ) ψ 2 β h, c, ν, ) Snce ψ 2 decreases f and only f ν < Rhh = R hh, ) and ν > R hh, we have βh β h. We denote that N = π hh + π hl + π lh + π ll whch s the proporton of SUs buyng contracts from PU. Hence, we have β h = m = β h N and m = N = 1. We get the concluson that βh = β h. When ν < R hh We can get smlar results usng smlar analyss as before. Thus, n the case where ν R hh, we have βh = β h and ψ 1 β h, c, ν, ) = ψ 2 β h, c, ν, ) = π lhr ll Ĉ h) + π llr ll Ĉ l) Therefore, for {1,, m} such that N >, {Ĉ, p, π hh, π hl, π ll, π lh } s feasble n O 2β h, c, ν, ) and t reveals that the optmal soluton to O 1 β h, c, ν,,, ) does concde wth the one to O 2 β h, c, ν, ) when ν R hh. B. Proof of Theorem 5 Proof: Suppose ν = { ν ψ 2 β h, c, ν, ω ) R ll Cl )}. If Rhh ν < ν, we have ψ 1 β h, c, ν, ) = ψ 2 β h, c, ν, ). Hence, ψ 1 β h, c, ν, ) > R ll Cl ). Then, we conclude that f Rhh ν < ν, each SU sgns an nsurance contract at the optmal soluton to O 1 β h, c, ν, ). From Lemma 4, we have Λ e h R hh. Under C 3, we have Λ e h = R hh. We get at PBE that satsfes C 2 and C 3, each SU purchases an nsurance contract. We prove the frst case of Theorem 5. Snce we consder PBE under C 2, Lemmas 3 and 4 reveal ψ 3 β h, c, R hh, ) = R ll C l ) s a necessary condton for PBE E 1 to exst. We seek to prove t s also a suffcent condton. Hence, we assume ψ 3 β h, c, R hh, ) = R ll C l ) and {C, p, πh, π l } s the PBE allocaton characterzed n ths case. We consder the case where PU devates from C by offerng C = Ch, C l ) nstead of C = C h, C l ). In the contnuaton subgame after the proposal of C, C ) C, p = p C, C ), π h = πh C, C ), π l = πl C, C ) and η = η C, C ) can be chosen such that 13)-15) and 17) hold. Then we have to prove that 16) also holds. We denote the expected proft of PU obtaned from an nsurance contract after the proposal of C, C as Ω = Ω C, C ), p C, C ), πh C, C ), πl C, C ) ) and we assume Ω e =, so 17) can be wrtten as Ω. When max { R ll Cl ), R lhch )} R ll C l ) We can construct the contnuaton equlbrum such that πlh + π ll = whch reveals that Ω. When max { R ll Cl ), R lhch )} > R ll C l ) We can choose πlh and π ll such that π lh + π ll = 1 and πlh R lhch ) + π ll R llcl ) = max{ R ll Cl ), R lhch )}. If πlh R lhch )+π ll R llcl ) <, we have Ω <. Otherwse, we consder two cases: R hh Ch ) R hh and R hh Ch ) < R hh. When R hh C h ) R hh We construct the contnuaton equlbrum after C, C ) s proposed. Addtonally, f R hl C l ) > R hhc h ), θ l > c and Bθ l, β h, c)π ll 1, we can choose p, 1) such that R hh C h ) = R hlc l, p ), π hl = Bθ l, β h, c)π ll and π hh = 1 π hl. Otherwse, we choose p = and π lh and π ll such that π lh + π ll = 1 and π hh R hhc h ) + π hl R hl C l ) = max{ R hh C h ), R hl C l )}. Hence, the strateges we have just constructed satsfes 13)-15) and 17).e., t s a contnuaton equlbrum. Moreover, the allocaton Q 2 = {C h, C l, p, π hh, π hl, π lh, π ll } satsfes 18), 19), 21) and 22). If 2) s also satsfed, we have that Q 2 s feasble n ψ 3 β h, c, R hh, ) and max { R ll C l ), R lhc h )} ψ 3 β h, c, R hh, ) = R ll C l ). Therefore, we arrve at a contradcton and Ω <. When R hh C h ) < R hh Smlar methods can be used to tackle ths case. Thus, we have fnshed the proof of the frst tem of Theorem 5. Its the second tem can be proved n smlar manner as before. Hence, we get the conclusons n Theorem

Spectrum Trading with Insurance in Cognitive Radio Networks

Spectrum Trading with Insurance in Cognitive Radio Networks Spectrum Trading with Insurance in Cognitive Radio Networks 1/46 Spectrum Trading with Insurance in Cognitive Radio Networks Haiming Jin 1, Gaofei Sun 1, Xinbing Wang 1 and Qian Zhang 2 1 Department of

More information

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS 39762

More information

Optimality in an Adverse Selection Insurance Economy. with Private Trading. April 2015

Optimality in an Adverse Selection Insurance Economy. with Private Trading. April 2015 Optmalty n an Adverse Selecton Insurance Economy wth Prvate Tradng Aprl 2015 Pamela Labade 1 Abstract An externalty s created n an adverse selecton nsurance economy because of the nteracton between prvate

More information

Pricing Model of Cloud Computing Service with Partial Multihoming

Pricing Model of Cloud Computing Service with Partial Multihoming Prcng Model of Cloud Computng Servce wth Partal Multhomng Zhang Ru 1 Tang Bng-yong 1 1.Glorous Sun School of Busness and Managment Donghua Unversty Shangha 251 Chna E-mal:ru528369@mal.dhu.edu.cn Abstract

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Optimality in an Adverse Selection Insurance Economy. with Private Trading. November 2014

Optimality in an Adverse Selection Insurance Economy. with Private Trading. November 2014 Optmalty n an Adverse Selecton Insurance Economy wth Prvate Tradng November 2014 Pamela Labade 1 Abstract Prvate tradng n an adverse selecton nsurance economy creates a pecunary externalty through the

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Downlink Power Allocation for Multi-class. Wireless Systems

Downlink Power Allocation for Multi-class. Wireless Systems Downlnk Power Allocaton for Mult-class 1 Wreless Systems Jang-Won Lee, Rav R. Mazumdar, and Ness B. Shroff School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN 47907, USA {lee46,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

Equlbra Exst and Trade S effcent proportionally

Equlbra Exst and Trade S effcent proportionally On Compettve Nonlnear Prcng Andrea Attar Thomas Marott Franços Salané February 27, 2013 Abstract A buyer of a dvsble good faces several dentcal sellers. The buyer s preferences are her prvate nformaton,

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

General Auction Mechanism for Search Advertising

General Auction Mechanism for Search Advertising General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an

More information

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks Coordnated Denal-of-Servce Attacks n IEEE 82.22 Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Stochastic Games on a Multiple Access Channel

Stochastic Games on a Multiple Access Channel Stochastc Games on a Multple Access Channel Prashant N and Vnod Sharma Department of Electrcal Communcaton Engneerng Indan Insttute of Scence, Bangalore 560012, Inda Emal: prashant2406@gmal.com, vnod@ece.sc.ernet.n

More information

A Novel Auction Mechanism for Selling Time-Sensitive E-Services

A Novel Auction Mechanism for Selling Time-Sensitive E-Services A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

How to Sell Innovative Ideas: Property right, Information. Revelation and Contract Design

How to Sell Innovative Ideas: Property right, Information. Revelation and Contract Design Presenter Ye Zhang uke Economcs A yz137@duke.edu How to Sell Innovatve Ideas: Property rght, Informaton evelaton and Contract esgn ay 31 2011 Based on James Anton & ennes Yao s two papers 1. Expropraton

More information

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:

More information

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers Prce Competton n an Olgopoly Market wth Multple IaaS Cloud Provders Yuan Feng, Baochun L, Bo L Department of Computng, Hong Kong Polytechnc Unversty Department of Electrcal and Computer Engneerng, Unversty

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

The Stock Market Game and the Kelly-Nash Equilibrium

The Stock Market Game and the Kelly-Nash Equilibrium The Stock Market Game and the Kelly-Nash Equlbrum Carlos Alós-Ferrer, Ana B. Ana Department of Economcs, Unversty of Venna. Hohenstaufengasse 9, A-1010 Venna, Austra. July 2003 Abstract We formulate the

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Online Procurement Auctions for Resource Pooling in Client-Assisted Cloud Storage Systems

Online Procurement Auctions for Resource Pooling in Client-Assisted Cloud Storage Systems Onlne Procurement Auctons for Resource Poolng n Clent-Asssted Cloud Storage Systems Jan Zhao, Xaowen Chu, Ha Lu, Yu-Wng Leung Department of Computer Scence Hong Kong Baptst Unversty Emal: {janzhao, chxw,

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Dynamic Online-Advertising Auctions as Stochastic Scheduling

Dynamic Online-Advertising Auctions as Stochastic Scheduling Dynamc Onlne-Advertsng Auctons as Stochastc Schedulng Isha Menache and Asuman Ozdaglar Massachusetts Insttute of Technology {sha,asuman}@mt.edu R. Srkant Unversty of Illnos at Urbana-Champagn rsrkant@llnos.edu

More information

Substitution Effects in Supply Chains with Asymmetric Information Distribution and Upstream Competition

Substitution Effects in Supply Chains with Asymmetric Information Distribution and Upstream Competition Substtuton Effects n Supply Chans wth Asymmetrc Informaton Dstrbuton and Upstream Competton Jochen Schlapp, Mortz Fleschmann Department of Busness, Unversty of Mannhem, 68163 Mannhem, Germany, jschlapp@bwl.un-mannhem.de,

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Adverse selection in the annuity market when payoffs vary over the time of retirement

Adverse selection in the annuity market when payoffs vary over the time of retirement Adverse selecton n the annuty market when payoffs vary over the tme of retrement by JOANN K. BRUNNER AND SUSANNE PEC * July 004 Revsed Verson of Workng Paper 0030, Department of Economcs, Unversty of nz.

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

QoS-Aware Spectrum Sharing in Cognitive Wireless Networks

QoS-Aware Spectrum Sharing in Cognitive Wireless Networks QoS-Aware Spectrum Sharng n Cogntve reless Networks Long Le and Ekram Hossan Abstract e consder QoS-aware spectrum sharng n cogntve wreless networks where secondary users are allowed to access the spectrum

More information

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers Far Vrtual Bandwdth Allocaton Model n Vrtual Data Centers Yng Yuan, Cu-rong Wang, Cong Wang School of Informaton Scence and Engneerng ortheastern Unversty Shenyang, Chna School of Computer and Communcaton

More information

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty

More information

Supply network formation as a biform game

Supply network formation as a biform game Supply network formaton as a bform game Jean-Claude Hennet*. Sona Mahjoub*,** * LSIS, CNRS-UMR 6168, Unversté Paul Cézanne, Faculté Sant Jérôme, Avenue Escadrlle Normande Némen, 13397 Marselle Cedex 20,

More information

Second-Best Combinatorial Auctions The Case of the Pricing-Per-Column Mechanism

Second-Best Combinatorial Auctions The Case of the Pricing-Per-Column Mechanism Proceedngs of the 4th Hawa Internatonal Conference on System Scences - 27 Second-Best Combnatoral Auctons The Case of the Prcng-Per-Column Mechansm Drk Neumann, Börn Schnzler, Ilka Weber, Chrstof Wenhardt

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

The Choice of Direct Dealing or Electronic Brokerage in Foreign Exchange Trading

The Choice of Direct Dealing or Electronic Brokerage in Foreign Exchange Trading The Choce of Drect Dealng or Electronc Brokerage n Foregn Exchange Tradng Mchael Melvn & Ln Wen Arzona State Unversty Introducton Electronc Brokerage n Foregn Exchange Start from a base of zero n 1992

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Joint Optimization of Bid and Budget Allocation in Sponsored Search

Joint Optimization of Bid and Budget Allocation in Sponsored Search Jont Optmzaton of Bd and Budget Allocaton n Sponsored Search Wenan Zhang Shangha Jao Tong Unversty Shangha, 224, P. R. Chna wnzhang@apex.sjtu.edu.cn Yong Yu Shangha Jao Tong Unversty Shangha, 224, P. R.

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Production. 2. Y is closed A set is closed if it contains its boundary. We need this for the solution existence in the profit maximization problem.

Production. 2. Y is closed A set is closed if it contains its boundary. We need this for the solution existence in the profit maximization problem. Producer Theory Producton ASSUMPTION 2.1 Propertes of the Producton Set The producton set Y satsfes the followng propertes 1. Y s non-empty If Y s empty, we have nothng to talk about 2. Y s closed A set

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

How To Improve Power Demand Response Of A Data Center Wth A Real Time Power Demand Control Program

How To Improve Power Demand Response Of A Data Center Wth A Real Time Power Demand Control Program Demand Response of Data Centers: A Real-tme Prcng Game between Utltes n Smart Grd Nguyen H. Tran, Shaole Ren, Zhu Han, Sung Man Jang, Seung Il Moon and Choong Seon Hong Department of Computer Engneerng,

More information

Capacity Reservation for Time-Sensitive Service Providers: An Application in Seaport Management

Capacity Reservation for Time-Sensitive Service Providers: An Application in Seaport Management Capacty Reservaton for Tme-Senstve Servce Provders: An Applcaton n Seaport Management L. Jeff Hong Department of Industral Engneerng and Logstcs Management The Hong Kong Unversty of Scence and Technology

More information

The literature on many-server approximations provides significant simplifications toward the optimal capacity

The literature on many-server approximations provides significant simplifications toward the optimal capacity Publshed onlne ahead of prnt November 13, 2009 Copyrght: INFORMS holds copyrght to ths Artcles n Advance verson, whch s made avalable to nsttutonal subscrbers. The fle may not be posted on any other webste,

More information

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece

More information

Dynamic Cost-Per-Action Mechanisms and Applications to Online Advertising

Dynamic Cost-Per-Action Mechanisms and Applications to Online Advertising Dynamc Cost-Per-Acton Mechansms and Applcatons to Onlne Advertsng Hamd Nazerzadeh Amn Saber Rakesh Vohra Abstract We examne the problem of allocatng a resource repeatedly over tme amongst a set of agents.

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Blind Estimation of Transmit Power in Wireless Networks

Blind Estimation of Transmit Power in Wireless Networks Bln Estmaton of Transmt Power n Wreless Networks Murtaza Zafer (IBM Research), Bongjun Ko (IBM Research), Chatschk Bskan (IBM Research) an Ivan Ho (Imperal College, UK) Transmt-power Estmaton: Problem

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

Allocating Collaborative Profit in Less-than-Truckload Carrier Alliance

Allocating Collaborative Profit in Less-than-Truckload Carrier Alliance J. Servce Scence & Management, 2010, 3: 143-149 do:10.4236/jssm.2010.31018 Publshed Onlne March 2010 (http://www.scrp.org/journal/jssm) 143 Allocatng Collaboratve Proft n Less-than-Truckload Carrer Allance

More information

Optimal Bidding Strategies for Generation Companies in a Day-Ahead Electricity Market with Risk Management Taken into Account

Optimal Bidding Strategies for Generation Companies in a Day-Ahead Electricity Market with Risk Management Taken into Account Amercan J. of Engneerng and Appled Scences (): 8-6, 009 ISSN 94-700 009 Scence Publcatons Optmal Bddng Strateges for Generaton Companes n a Day-Ahead Electrcty Market wth Rsk Management Taken nto Account

More information

How Bad are Selfish Investments in Network Security?

How Bad are Selfish Investments in Network Security? 1 How Bad are Selfsh Investments n Networ Securty? Lbn Jang, Venat Anantharam and Jean Walrand EECS Department, Unversty of Calforna, Bereley {ljang,ananth,wlr}@eecs.bereley.edu Abstract Internet securty

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Necessary Of A Retaler-Operator

Necessary Of A Retaler-Operator Decentralzed Inventory Sharng wth Asymmetrc Informaton Xnghao Yan Hu Zhao 1 xyan@vey.uwo.ca zhaoh@purdue.edu Rchard Ivey School of Busness The Unversty of Western Ontaro Krannert School of Management Purdue

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

Embedding lattices in the Kleene degrees

Embedding lattices in the Kleene degrees F U N D A M E N T A MATHEMATICAE 62 (999) Embeddng lattces n the Kleene degrees by Hsato M u r a k (Nagoya) Abstract. Under ZFC+CH, we prove that some lattces whose cardnaltes do not exceed ℵ can be embedded

More information

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers 1 Domnant Resource Farness n Cloud Computng Systems wth Heterogeneous Servers We Wang, Baochun L, Ben Lang Department of Electrcal and Computer Engneerng Unversty of Toronto arxv:138.83v1 [cs.dc] 1 Aug

More information

Addendum to: Importing Skill-Biased Technology

Addendum to: Importing Skill-Biased Technology Addendum to: Importng Skll-Based Technology Arel Bursten UCLA and NBER Javer Cravno UCLA August 202 Jonathan Vogel Columba and NBER Abstract Ths Addendum derves the results dscussed n secton 3.3 of our

More information

Optimization of Resource Allocation in Wireless Systems Based on Game Theory

Optimization of Resource Allocation in Wireless Systems Based on Game Theory Internatonal Journal of Computer Scences and Engneerng Open Access Research Paper Volume-4, Issue-1 E-ISSN: 347-693 Optmzaton of Resource Allocaton n Wreless Systems Based on Game Theory Sara Rah 1*, Al

More information

Peer-to-Peer Tangible Goods Rental

Peer-to-Peer Tangible Goods Rental Peer-to-Peer Tangble Goods Rental James A. Hll and Mchael P. Wellman Unversty of Mchgan, Computer Scence & Engneerng, 2260 Hayward St, Ann Arbor, MI 48109-2121, USA {auge,wellman}@umch.edu Abstract. We

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

Adverse selection in the annuity market with sequential and simultaneous insurance demand. Johann K. Brunner and Susanne Pech *) January 2005

Adverse selection in the annuity market with sequential and simultaneous insurance demand. Johann K. Brunner and Susanne Pech *) January 2005 Adverse selecton n the annuty market wth sequental and smultaneous nsurance demand Johann K. Brunner and Susanne Pech *) January 005 Revsed Verson of Workng Paper 004, Department of Economcs, Unversty

More information

Nordea G10 Alpha Carry Index

Nordea G10 Alpha Carry Index Nordea G10 Alpha Carry Index Index Rules v1.1 Verson as of 10/10/2013 1 (6) Page 1 Index Descrpton The G10 Alpha Carry Index, the Index, follows the development of a rule based strategy whch nvests and

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

The Games of Cournot Sports

The Games of Cournot Sports Appled Mathematcal Scences, Vol. 7, 013, no. 4, 01-09 Managers Compensaton and Colluse Behaour under Cournot Olgopoly Marco A. Marn Department of Computer, Control and Management Engneerng Unerstà d Roma

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems 1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton

More information

Kiel Institute for World Economics Duesternbrooker Weg 120 24105 Kiel (Germany) Kiel Working Paper No. 1120

Kiel Institute for World Economics Duesternbrooker Weg 120 24105 Kiel (Germany) Kiel Working Paper No. 1120 Kel Insttute for World Economcs Duesternbrooker Weg 45 Kel (Germany) Kel Workng Paper No. Path Dependences n enture Captal Markets by Andrea Schertler July The responsblty for the contents of the workng

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

AN optimization problem to maximize the up-link

AN optimization problem to maximize the up-link IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 57, NO. 8, AUGUST 29 2225 Power and Rate Control wth Outage Constrants n CDMA Wreless Networks C. Fschone, M. Butuss, K. H. Johansson, and M. D Angelo Abstract

More information

Joint Dynamic Radio Resource Allocation and Mobility Load Balancing in 3GPP LTE Multi-Cell Network

Joint Dynamic Radio Resource Allocation and Mobility Load Balancing in 3GPP LTE Multi-Cell Network 288 FENG LI, LINA GENG, SHIHUA ZHU, JOINT DYNAMIC RADIO RESOURCE ALLOCATION AND MOBILITY LOAD BALANCING Jont Dynamc Rado Resource Allocaton and Moblty Load Balancng n 3GPP LTE Mult-Cell Networ Feng LI,

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract

More information