期刊文献+

一种面向众包的基于信誉值的激励机制 被引量:53

Reputation-based Incentive Mechanisms in Crowdsourcing
下载PDF
导出
摘要 众包是互联网带来的一种分布式问题解决模式。然而,由于工作者和任务发布者具有自私特性并且致力于获得自身效益的最大化,使得在众包应用中,存在内部的激励问题。该文主要完成以下工作:首先,基于重复博弈,提出一种基于信誉值的激励模型,用于激励理性工作者高质量地完成任务;其次,该激励模型中同时设置了惩罚机制,将针对恶意工作者做出相应惩罚。仿真结果表明,即使在自私工作者比例为0.2的条件下,只要合理选择惩罚参数,均可有效激励理性工作者的尽力工作,众包平台的整体性能可以提升至90%以上。 Crowdsourcing is a new distributed problem solving pattern brought by the Internet. However, intrinsic incentive problems reside in crowdsourcing applications as workers and requester are selfish and aim to maximize their own benefit. In this paper, the following key contributions are made. A reputation-based incentive model is designed using repeated game theory, based on thorough analysis for current research on reputation and incentive mechanism; and a punishment mechanism is established to counter selfish workers. The experiment results show that the new established model can efficiently motivate the rational workers and counter the selfish ones. By setting punishment parameters appropriately, the overall performance of crowdsourcing system can be improved up to 90%, even if the fraction of selfish workers is 20%.
出处 《电子与信息学报》 EI CSCD 北大核心 2016年第7期1808-1815,共8页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61302078 61372108) 国家自然科学基金创新研究群体科学基金(61121061) 北京高等学校青年英才计划项目(YETP0476)~~
关键词 众包平台 激励模型 惩罚机制 重复博弈 Crowdsourcing system Incentive mechanisms Punishment mechanisms Repeated game
  • 相关文献

参考文献16

  • 1张志强,逄居升,谢晓芹,周永.众包质量控制策略及评估算法研究[J].计算机学报,2013,36(8):1636-1649. 被引量:59
  • 2HOSSEINI M, PHALPK, TAYLOR J, et al. The four pillars of crowdsourcing: A reference model[C]. 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS), Marrakech, 2014: 1-12.
  • 3SHEN H, LI Z, LIU J, et al.. Knowledge sharing in the online social network of Yahoo! answers and its implications [J]. IEEE Transactions on Computers, 2014, 64(6): 1715-1728.
  • 4WU H, CORNEY J, and GRANT M. Relationship between quality and payment in crowdsourced design[C]. Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Hsinchu, 2014: 499-504.
  • 5DOAN A, RAMAKRISHNAN R, and HALEVY A, Crowdsourcing systems on the World-Wide Web[J]. Communications of the ACM, 2011, 54(4): 86-96.
  • 6MALANDRINO F, CASETTI C, and CHIASSERINI C. Content discovery and caching in mobile networks with infrastructure[J]. IEEE Transactions on Computers, 2012, 61(10): 1507-1520.
  • 7谢晓兰,刘亮,赵鹏.面向云计算基于双层激励和欺骗检测的信任模型[J].电子与信息学报,2012,34(4):812-817. 被引量:20
  • 8杨明,刘元安,马晓雷,李立.一种基于定价与信任的网格资源分配算法[J].电子与信息学报,2010,32(4):846-851. 被引量:4
  • 9YANG D, XUE G, FANG X, et al. Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing[C]. Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MOBICOM 2012), New York, 2012: 173-184.
  • 10ZHANG Y and SCHAAR M. Reputation-based incentive protocols in crowdsourcing applications[C]. IEEE INFOCOM, Orlando, FL, 2012: 2140-2148.

二级参考文献41

  • 1唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 2常俊胜,王怀民,尹刚.DyTrust:一种P2P系统中基于时间帧的动态信任模型[J].计算机学报,2006,29(8):1301-1307. 被引量:101
  • 3李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 4Patel J. A trust and reputation model for agent-based virtual organizations [D]. [Ph.D. dissertation], University of Southampton, 2007.
  • 5Chandrashekar T S, Narahari Y, and Rosa C H, et al. Auction-based mechanisms for electronic procurement [J] IEEE Transactions on Automation Science and Engineering 2007, 4 (3): 297-321.
  • 6Xia M, Stallaert J, and Whinston A B. Solving the combinatorial double auction problem [J]. European Journal of Operational Research, 2005, 164(1): 239-251.
  • 7Ma J and Orgun M A. Trust management and trust theory revision [J]. IEEE Transactions on System, Man and Cybernetics-Part A: System and Human, 2006, 36(3): 451-460.
  • 8Vijayakumar V and WahidhaBanu R S D. Trust and reputation aware security for resource selection in grid computing [C]. 2008 International Conference on Security Technology Proceedings, Sanya, China, Dec. 13-15, 2008: 121-124.
  • 9Yuan L, He Z, and Zeng G. A resource trade model based on trust evaluation for grid computing [C]. 2007 IFIP International Conference on Network and Parallel Computing Proceedings, Dalian, China, Sep. 18-21, 2007: 506-511.
  • 10Esther D, Rina A S, and Sarit K. Protocols and strategies for automated multi-attributes auctions [C]. The 1st Conference on Autonomous Agents and Multi-agent Systems Proceedings, Bologna, Italy, 2002: 77-85.

共引文献80

同被引文献300

引证文献53

二级引证文献140

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部