Task Planning and Incentives in Ubiquitous Crowdsourcing KSE801 Uichin Lee.

Slides:



Advertisements
Similar presentations
QoS-based Management of Multiple Shared Resources in Dynamic Real-Time Systems Klaus Ecker, Frank Drews School of EECS, Ohio University, Athens, OH {ecker,
Advertisements

Taming User-Generated Content in Mobile Networks via Drop Zones Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio Nucci Northwestern University.
Incentivize Crowd Labeling under Budget Constraint
Mining Compressed Frequent- Pattern Sets Dong Xin, Jiawei Han, Xifeng Yan, Hong Cheng Department of Computer Science University of Illinois at Urbana-Champaign.
Time-of-Use and Critical Peak Pricing
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
A Prior-Free Revenue Maximizing Auction for Secondary Spectrum Access Ajay Gopinathan and Zongpeng Li IEEE INFOCOM 2011, Shanghai, China.
Wei Dong 1 Joint work with Swati Rallapalli 1, Rittwik Jana 2, Lili Qiu 1, K. K. Ramakrishnan 2, Leonid V. Razoumov 2, Yin Zhang 1, Tae Won Cho 2 1 The.
Presented by: Sheekha Khetan. Mobile Crowdsensing - individuals with sensing and computing devices collectively share information to measure and map phenomena.
Preference Elicitation Partial-revelation VCG mechanism for Combinatorial Auctions and Eliciting Non-price Preferences in Combinatorial Auctions.
Seminar In Game Theory Algorithms, TAU, Agenda  Introduction  Computational Complexity  Incentive Compatible Mechanism  LP Relaxation & Walrasian.
10 REASONS Why it makes a good option for your DB IN-MEMORY DATABASES Presenter #10: Robert Vitolo.
Cloud Computing Resource provisioning Keke Chen. Outline  For Web applications statistical Learning and automatic control for datacenters  For data.
CS 495 Application Development for Smart Devices Mobile Crowdsensing Current State and Future Challenges Mobile Crowdsensing. Overview of Crowdsensing.
Yi Wang, Wenjie Hu, Yibo Wu and Guohong Cao
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Evolutionary Computational Intelligence Lecture 10a: Surrogate Assisted Ferrante Neri University of Jyväskylä.
A Heuristic Bidding Strategy for Multiple Heterogeneous Auctions Patricia Anthony & Nicholas R. Jennings Dept. of Electronics and Computer Science University.
Self-Correlating Predictive Information Tracking for Large-Scale Production Systems Zhao, Tan, Gong, Gu, Wambolt Presented by: Andrew Hahn.
Improving Robustness in Distributed Systems Jeremy Russell Software Engineering Honours Project.
A Payment-based Incentive and Service Differentiation Mechanism for P2P Streaming Broadcast Guang Tan and Stephen A. Jarvis Department of Computer Science,
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
Data Mining – Intro.
Truthfulness and Approximation Kevin Lacker. Combinatorial Auctions Goals – Economically efficient – Computationally efficient Problems – Vickrey auction.
Data Selection In Ad-Hoc Wireless Sensor Networks Olawoye Oyeyele 11/24/2003.
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
Allerton 2011 September 28 Mathias Humbert, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux EPFL - Laboratory for Communications and Applications (LCA1)
4.x Performance Technology drivers – Exascale systems will consist of complex configurations with a huge number of potentially heterogeneous components.
Particle Filtering in Network Tomography
© 2009 IBM Corporation Let’s Build a Smarter Planet Thongchai Watanasoponwong – Country Manager Power Systems, STG September 15 th, 2009 Green IT เทคโนโลยีสีเขียวเพื่อสิ่งแวดล้อม.
HERO: Online Real-time Vehicle Tracking in Shanghai Xuejia Lu 11/17/2008.
Network Aware Resource Allocation in Distributed Clouds.
Budgetary Control and Responsibility Accounting
An Online Auction Framework for Dynamic Resource Provisioning in Cloud Computing Weijie Shi*, Linquan Zhang +, Chuan Wu*, Zongpeng Li +, Francis C.M. Lau*
On QoS Guarantees with Reward Optimization for Servicing Multiple Priority Class in Wireless Networks YaoChing Peng Eunyoung Chang.
Combinatorial Auctions By: Shai Roitman
Task Planning and Incentives in Mobile Sensing KSE652 Social Computing Systems Design and Analysis Uichin Lee.
How Aircraft Operators Can Benefit from PHM Techniques Big Sky - Montana 2012 IEEE Aerospace Conference Leonardo Ramos Rodrigues EMBRAER S.A., São José.
Utilizing Call Admission Control for Pricing Optimization of Multiple Service Classes in Wireless Cellular Networks Authors : Okan Yilmaz, Ing-Ray Chen.
Scheduling policies for real- time embedded systems.
Software Development using artificial markets of constructively egoistic agents Karl Lieberherr 1SD-F09.
© 2010 IBM Corporation IBM Research - Ireland © 2014 IBM Corporation xStream Data Fusion for Transport Smarter Cities Technology Centre IBM Research.
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
MURI: Integrated Fusion, Performance Prediction, and Sensor Management for Automatic Target Exploitation 1 Dynamic Sensor Resource Management for ATE MURI.
Data Mining – Intro. Course Overview Spatial Databases Temporal and Spatio-Temporal Databases Multimedia Databases Data Mining.
This document contains confidential or privileged information. This information is intended for the use of the named recipient(s). Disclosure, copying.
A Distributed Coordination Framework for Wireless Sensor and Actor Networks Tommaso Melodia, Dario Pompili, Vehbi C.Gungor, Ian F.Akyildiz (MobiHoc 2005)
Copying distribution or use of the contents of this document is prohibited without written authorization from SafeHarbor Technology Corporation. Maximizing.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
Design and Assessment of the Toronto Area Computerized Household Activity Scheduling Survey Sean T. Doherty, Erika Nemeth, Matthew Roorda, Eric J. Miller.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Steffen Staab 1WeST Web Science & Technologies University of Koblenz ▪ Landau, Germany Network Theory and Dynamic Systems Auctions.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
Introduction to Models Lecture 8 February 22, 2005.
Or How to Gain and Sustain a Competitive Advantage for Your Sales Team Key’s to Consistently High Performing Sales Organizations © by David R. Barnes Jr.
Text Information Management ChengXiang Zhai, Tao Tao, Xuehua Shen, Hui Fang, Azadeh Shakery, Jing Jiang.
Quality Is in the Eye of the Beholder: Meeting Users ’ Requirements for Internet Quality of Service Anna Bouch, Allan Kuchinsky, Nina Bhatti HP Labs Technical.
Introduction Social ecological approach to behavior change
Urban Sensing Based on Human Mobility
System Control based Renewable Energy Resources in Smart Grid Consumer
Server Allocation for Multiplayer Cloud Gaming
ISP and Egress Path Selection for Multihomed Networks
th IEEE International Conference on Sensing, Communication and Networking Online Incentive Mechanism for Mobile Crowdsourcing based on Two-tiered.
Social Role Evolution of an Ideological Online Community Brittany I
Speaker : Lee Heon-Jong
Overview: Chapter 2 Localization and Tracking
Presentation transcript:

Task Planning and Incentives in Ubiquitous Crowdsourcing KSE801 Uichin Lee

Recruitment Framework for Participatory Sensing Data Collections KSE801 Uichin Lee

Participatory Sensing Allowing people to investigate processes with mobile phones Community based data collection and citizen science; offering automation, scalability, and real-time processing and feedback Examples: taking photos of assets that document recycling behavior, flora variety, and green resources in a university

Participatory Sensing: Challenges Diverse users and participatory sensing projects How to identify participants to projects? Goal: devise a new recruitment framework using availability and reputation – Spatio-temporal availability based on mobility and transport mode – Reputation of data collection performance

Sustainability Campaigns GarbageWatch: The campus needs to divert 75% of its waste stream from landfills, and effective recycling can help reach this goal. By analyzing photos, one can determine if recyclables (paper, plastic, glass, or aluminum) are being disposed of in waste bins, and then identify regions and time periods with low recycling rates. What's Bloomin: Water conservation is a high priority issue for the campus and efficient landscaping can help. By collecting (geo- tagged) photos of blooming flora, facilities could later replace high water usage plants with ones that are drought tolerant. AssetLog: For sustainable practices to thrive on a campus, the existence and locations of up-to-date “green" resources needs to be documented (e.g., bicycle racks, recycle bins, and charge stations).

Sustainability Campaigns

System Overview

Recruitment Framework Qualifier: minimum requirements – Availability: destinations and routes within space, time, and mode of transport constraints – Reputation: sampling likelihood, quality, and validity over several campaigns or by campaign-specific calibration exercises Assessment: participant selection – Identify a subset of individuals who could maximize coverage over a campaign area and time period while adhering to the required mode of transport – Cost may be considered when selecting participants Progress review: checking “consistency” – Review coverage and data collection performance periodically – If participants are below a certain threshold, provide feedback, or recruit more participants

Related Work Mobility models – Location summarization for personal analytics: from location traces to places (e.g., spatio-temporal clustering, density-based clustering, reverse geo-coding) – Location prediction to adapt applications: mostly for location- based services (LBS); prediction methods include Markov models, time-series analysis, etc. Reputation systems: – Summation and average (e.g., Amazon review) – Bayesian systems (e.g., Beta reputation system) Selection services: – Online labor markets: M-Turk, GURU.com – Sensor systems: traditional sensor networks focused on coverage (or sensing in a predefined zone)

Coverage Based Recruitment Mobility traces (say for every 30 seconds) Density-based clustering to find “destinations” (or places) Routes are points between destinations Mode of transport is inferred (e.g., still, walking, running, biking, or diving) Qualifier filters: e.g., selecting individuals with at least 5 destinations in a certain area in a week or individuals with at least 7 unique walking routes during day time weekday hours Assessment: – Given (1) a set of participants with associated costs and spatial blocks w/ mode of transport over time, and (2) block with certain utilities – Maximize the utility under budget constraints (NP-hard) Greedy algorithm is known to achieve at least 63% from the optimum

Coverage Based Recruitment Reviewing M*N spatio-temporal association matrix – M rows: spatial blocks (100m*100m) – N: distinct time slots in a day (cumulated over a week) – Entry: the proportion of time spent in a spatial block (that satisfies mode of transport and monitoring period constraints) Comparing two consecutive weeks (to check deviation) – Singular Value Decomposition (SVD): U*∑*V t U: patterns common across different time periods (days) ∑: singular values (σ 1 …σ rank ) show variance represented by each pattern where

Participation and Performance Based Recruitment Cross-campaign vs. campaign-specific Focus on campaign-specific indicators – Timeliness (latency) – Relevancy (falls in phenomenon of interests) – Quality – Participation likelihood: whether an individual took a sample when given the opportunity Beta reputation model w/ Beta distribution where α (#success) β (#failure) – Expected reputation: E = α/(α+β) – Exponential averaging over time (w/ some aging factor w)

Evaluation Campaign deployment information: Ground-truth: experts traversed the routes

Coverage Based Recruitment Evaluated assessment methods: – Random: select users from campaigns arbitrarily – Naïve: select users who cover the most blocks overall without considering coverage of existing participants – Greedy: select users who maximize utility by considering coverage of existing participants

Coverage Based Recruitment Consistency check for campaign coverage (progress review) (changed mode of transport: from walking to driving)

Participation and Performance Based Recruitment Evaluated participation likelihood – Other metrics not considered (e.g., timeliness, relevancy, quality due to the nature of projects, i.e., auto uploading) A user’s reputation after “AssetLog calibration exercise”

Participation and Performance Based Recruitment Re-evaluating reputation over two weeks – With (c) and without (d) exponential aging

Discussion Greedy vs. naïve: if users’ coverage overlaps more, there will be much difference.. Across campaign consideration (due to individual’s preference, performance may be different) Participants grew tried of collecting samples Participants reported that the act of data capture should be streamlined so that it can be repeated rapidly Participants wanted visualization (e.g., map) Participants were generally OK with “minor” deviation from their routes, but drastic change may require some incentives

Dynamic Pricing Incentive for Participatory Sensing Juong-Sik Lee and Baik Hoh Nokia Research Pervasive and Mobile Computing 2010

Introduction Dynamic return of investment (ROI) of participatory sensing applications (different data types, users’ context, etc) Fixed price incentives may not work well; further, it’s hard to come up with an optimal price Reverse auction: users bid for selling their data, and the buyer selects a predefined number of lower bit price users – Selling price dynamically changes

Reverse Auction A user’s utility: U(b) = (b-t)*p(b) – b: received credit – t: base value of the data (that a user think) – p(b): winning probability

Problems with Reverse Auction Lost users may drop out of the system Incentive cost explosion happens when a system has below a threshold number users (here, m) – Those users can increase their bid as much as possible Solution: for each loss, buyer gives virtual participation credit (of fixed amount α); credit cumulates over time – Seller can use the credit to lower its bid (thus, increasing winning probability) Incentive cost explosion BID Give “virtual credit” α to losers winnerslosers

Credit-based Incentives

Summary Random Selection based Fixed Pricing (RSFP): – (+)Simple to implement – (+) Easy to predict total incentive cost – (-) Difficult optimal incentive price decision – (-) Unable to adapt to dynamic environments Reverse auction dynamic pricing w/ virtual credit (RADP-VPC) – (+) Eliminate complexity of incentive price decision – (+) Able to adapt to dynamic environments – (+) Minimize incentive cost – (+) Better fairness of incentive distribution – (+) Higher social welfare – (-) Relatively harder to implement than RSFP

Evaluation Model ROI till round r = [earning so far] / [# of participation till round r]*[min reward] If ROI(r) drops below 0.5, a user drops out of the system A user’s valuation is randomly generated based on some distribution Evaluation items – Incentive cost reduction – Fairness against true valuation – Service quality

Incentive Cost Comparison

Incentive Cost Reduction Reverse auction dynamic pricing with virtual participation credit (RADP-VPC)

Fairness Against True Valuation

Service Quality Guarantee

Discussion Privacy leak: one has to send data with bid – Data encryption prevents the buyer from validating the quality (how about using homomorphic crypto?) Data broker in between seller and buyer – Data collection, maintenance, processing/mining Handling different types of apps (e.g., real-time vs. asynchronous) How to guarantee data integrity and to maintain seller’s reputation?