• Title/Summary/Keyword: Sharing coordinate systems

Search Result 17, Processing Time 0.031 seconds

On eBay's Fee Structure from a Channel Coordination Perspective

  • Chen, Jen-Ming;Cheng, Hung-Liang;Chien, Mei-Chen
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.2
    • /
    • pp.97-106
    • /
    • 2010
  • Can eBay.com's fee structure coordinate the channel? It's a critical strategic problem in e-commerce operations and an interesting research hypothesis as well. eBay's fees include three parts: monthly subscription fee, insertion fee, and final value fee (i.e., a revenue sharing portion), which represent a generic form of revenue sharing fee structure between the retailer and the vendor in a supply chain. This research deals with such a channel consisting of a price-setting vendor who sells products through eBay's marketplace exclusively to the end customers. The up- and down-stream channel relationship is consignment-based revenue sharing. We use a game-theoretic approach with assumption of the retailer (i.e., eBay.com) being a Stackelberg-leader and the vendor being a follower. The Stackelberg-leader decides on the terms of revenue sharing contract (i.e., fee structure), and the follower (vendor) decides on how many units to sell and the items' selling price. This study formulates several profit-maximization models by considering the effects of the retail price on the demand function. Under such settings, we show that eBay's fee structure can improve the channel efficiency; yet it cannot coordinate the channel optimally.

Coordination among the Security Systems using the Blackboard Architecture (블랙보드구조를 활용한 보안 모델의 연동)

  • 서희석;조대호
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.4
    • /
    • pp.310-319
    • /
    • 2003
  • As the importance and the need for network security are increased, many organizations use the various security systems. They enable to construct the consistent integrated security environment by sharing the network vulnerable information among IDS (Intrusion Detection System), firewall and vulnerable scanner. The multiple IDSes coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (Blackboard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (Blackboard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete Event system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses to these detection information.

Decentralized Supply Chain Coordination with Revenue Sharing Mechanism: Transfer Pricing Heuristics and Revenue Share Rates

  • Chen, Hung-Yi;Wu, Hsiao-Chung
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.4
    • /
    • pp.213-220
    • /
    • 2009
  • A revenue sharing contract is one of the mechanisms that coordinate decision makers in a decentralized supply chain toward the consensual goal. The transfer prices between different echelons in the supply chain influence the total supply chain profits. The study aims to explore various transfer pricing heuristics on the supply chain coordination in terms of the supply chain profits and their interactions with the revenue sharing rate. A model is proposed for formulating the collaborative production and distribution planning in a decentralized supply chain with the revenue sharing mechanism. Experiment results indicate that the transfer price and the revenue sharing rate affect significantly the coordination. Among the studied pricing heuristics, the variable-cost pricing method led to the best SC profits. Raising the revenue sharing rate reduced the SC profits no matter what heuristics were employed. Furthermore, the experiments provide us clues for finding the optimal transfer price for the supply chain.

KAWS: Coordinate Kernel-Aware Warp Scheduling and Warp Sharing Mechanism for Advanced GPUs

  • Vo, Viet Tan;Kim, Cheol Hong
    • Journal of Information Processing Systems
    • /
    • v.17 no.6
    • /
    • pp.1157-1169
    • /
    • 2021
  • Modern graphics processor unit (GPU) architectures offer significant hardware resource enhancements for parallel computing. However, without software optimization, GPUs continuously exhibit hardware resource underutilization. In this paper, we indicate the need to alter different warp scheduler schemes during different kernel execution periods to improve resource utilization. Existing warp schedulers cannot be aware of the kernel progress to provide an effective scheduling policy. In addition, we identified the potential for improving resource utilization for multiple-warp-scheduler GPUs by sharing stalling warps with selected warp schedulers. To address the efficiency issue of the present GPU, we coordinated the kernel-aware warp scheduler and warp sharing mechanism (KAWS). The proposed warp scheduler acknowledges the execution progress of the running kernel to adapt to a more effective scheduling policy when the kernel progress attains a point of resource underutilization. Meanwhile, the warp-sharing mechanism distributes stalling warps to different warp schedulers wherein the execution pipeline unit is ready. Our design achieves performance that is on an average higher than that of the traditional warp scheduler by 7.97% and employs marginal additional hardware overhead.

An Application of Blackboard Architecture for the Coordination among the Security Systems (보안 모델의 연동을 위한 블랙보드구조의 적용)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.4
    • /
    • pp.91-105
    • /
    • 2002
  • The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of amy one system to deal with the intrusions. That the multiple IDSes (Intrusion Detection System) coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (BlackBoard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (BlackBoard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete EVent system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses these detection information.

  • PDF

A Coordinated Planning Model with Price-Dependent Demand

  • Nagarur, Nagendra N.;Iaprasert, Wipanan
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.1
    • /
    • pp.1-13
    • /
    • 2009
  • This paper presents a coordinated planning model of price-dependent demand for a single-manufacturer and a single-retailer. The demand is assumed to be normally distributed, with its mean being price dependent. The manufacturer and retailer coordinate with each other to jointly and simultaneously determine the retail selling price and the retailer order quantity to maximize the joint expected total profit. This model is then compared to a 'returns' policy model where manufacturer buys back unsold items from the retailers. It is shown that the optimal total profit is higher for coordinated planning model than that for the returns policy model, in which the retail price is set by the retailer. A compensation or profit sharing scheme is then suggested and it is shown that the coordinated model with profit sharing yields a 'win-win' situation. Numerical results are presented to illustrate the profit patterns for both linear and nonlinear demand functions. The coordinated planning model, in addition, has a lower optimal price than for a returns policy model, which would result in higher sales, thus expanding the markets for the whole supply chain.

Competitive Resource Sharing Based on Game Theory in Cooperative Relay Networks

  • Zhang, Guopeng;Cong, Li;Zhao, Liqiang;Yang, Kun;Zhang, Hailin
    • ETRI Journal
    • /
    • v.31 no.1
    • /
    • pp.89-91
    • /
    • 2009
  • This letter considers the problem of resource sharing among a relay and multiple user nodes in cooperative transmission networks. We formulate this problem as a sellers' market competition and use a noncooperative game to jointly consider the benefits of the relay and the users. We also develop a distributed algorithm to search the Nash equilibrium, the solution of the game. The convergence of the proposed algorithm is analyzed. Simulation results demonstrate that the proposed game can stimulate cooperative diversity among the selfish user nodes and coordinate resource allocation among the user nodes effectively.

  • PDF

Joint Mode Selection, Link Allocation and Power Control in Underlaying D2D Communication

  • Zhang, Wei;He, Wanbing;Wu, Dan;Cai, Yueming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5209-5228
    • /
    • 2016
  • Device-to-device (D2D) communication underlaying cellular networks can bring significate benefits for improving the performance of mobile services. However, it hinges on elaborate resource sharing scheme to coordinate interference between cellular users and D2D pairs. We formulate a joint mode selection, link allocation and power control optimization problem for D2D communication sharing uplink resources in a multi-user cellular network and consider the efficiency and the fairness simultaneously. Due to the non-convex difficulty, we propose a three-step scheme: firstly, we conduct mode selection for D2D pairs based on a minimum distance metric after an admission control and obtain some cellular candidates for them. And then, a cellular candidate will be paired to each D2D pair based on fairness. Finally, we use Lagrangian Algorithm to formulate a joint power control strategy for D2D pairs and their reused cellular users and a closed-form of solution is derived. Simulation results demonstrate that our proposed algorithms converge in a short time. Moreover, both the sum rate of D2D pairs and the energy efficiency of cellular users are improved.

Fuzzy Controller Design for Selecting the Agent of Contract Net Protocol (계약망 프로토콜의 에이전트 선택을 위한 퍼지 컨트롤러 설계)

  • 서희석;김희완
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.251-260
    • /
    • 2004
  • As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. We construct the integrated security simulation environment that can be used by some security system model. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. We compare the selection algorithm in the CPN with the Fuzzy Controller for the effective method to select the agents.

  • PDF

Novel Beamforming and User Scheduling Algorithm for Inter-cell Interference Cancellation

  • Kim, Kyunghoon;Piao, Jinhua;Choi, Seungwon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.5
    • /
    • pp.346-348
    • /
    • 2016
  • Coordinated multi-point transmission is a candidate technique for next-generation cellular communications systems. We consider a system with multiple cells in which base stations coordinate with each other by sharing user channel state information, which mitigates inter-cell interference (ICI), especially for users located at the cell edge. We introduce a new user scheduling method that considers both ICI and intra-cell orthogonality. Due to the influence of ICI cancellation and the loss reduction of effective channel gain during the beamforming process, the proposed method improves the system sum rate, when compared to the conventional method, by an average of 0.55bps/Hz for different numbers of total users per cell.