As in any new technology adoption in organizations, big data solutions (BDS) also presents some security threat and challenges, especially due to the characteristics of big data itself-the volume, velocity and variety of data. Even though many security considerations associated to the adoption of BDS have been publicized, it remains unclear whether these… (More)
a scenario, new pricing approaches are needed to charge the user according to dynamic factors such as current congestion levels or the the number of customers present at a specific location. The developed simulation environment serves as a generic tool for implementing and testing different pricing approaches.
This paper demonstrates the application of two efficient cost allocation mechanisms on a simple FIFO network model in order to find congestion-based prices for network access services. It is shown that it is possible to obtain congestion-dependent prices in data networks (such as the Internet), establishing simultaneously different service quality levels… (More)
Next-generation wireless networks will enable the usage of different network technologies fully transparent to the user. Applications will be able to dynamically adapt to the conditions and technical constraints of the network. This vision requires a dynamic allocation of scarce network resources to different users. This paper presents simulation results… (More)
— This paper presents a flow-based, auction-driven approach to resource allocation. This approach allows mobile stations to simultaneously negotiate for resources from competing providers. We use an auction at each provider to decide on the resource allocation, based on the offers made by agents representing mobile nodes. All agents in the system try to… (More)