{"title":"信息网络编码的博弈论方法","authors":"J. Price, T. Javidi","doi":"10.1109/ALLERTON.2008.4797724","DOIUrl":null,"url":null,"abstract":"Since its inception, network coding literature has, for the most part, assumed cooperation among users. In unicast applications where users have no inherent interest in providing (or concealing) their information to (or from) any destinations except for their unique one, this assumption must be reconsidered. In this paper, we examine the impact of selfish users on coding strategies by formulating network coding games, in which users strategies are their encoding/decoding schemes (including encoding functions, block length, rate, etc). Through the use of examples, we show that the rational outcomes of such network coding games are dependent on the particular network coding scheme implemented at intermediate nodes in the network. More specifically, we construct examples that show how careful construction of network coding schemes at intermediate nodes in the network can guarantee that efficient coding solutions will emerge as a rational outcome of the game, even when users are allowed complete freedom in choosing their coding schemes.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A game-theoretic approach to coding for information networks\",\"authors\":\"J. Price, T. Javidi\",\"doi\":\"10.1109/ALLERTON.2008.4797724\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since its inception, network coding literature has, for the most part, assumed cooperation among users. In unicast applications where users have no inherent interest in providing (or concealing) their information to (or from) any destinations except for their unique one, this assumption must be reconsidered. In this paper, we examine the impact of selfish users on coding strategies by formulating network coding games, in which users strategies are their encoding/decoding schemes (including encoding functions, block length, rate, etc). Through the use of examples, we show that the rational outcomes of such network coding games are dependent on the particular network coding scheme implemented at intermediate nodes in the network. More specifically, we construct examples that show how careful construction of network coding schemes at intermediate nodes in the network can guarantee that efficient coding solutions will emerge as a rational outcome of the game, even when users are allowed complete freedom in choosing their coding schemes.\",\"PeriodicalId\":120561,\"journal\":{\"name\":\"2008 46th Annual Allerton Conference on Communication, Control, and Computing\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 46th Annual Allerton Conference on Communication, Control, and Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ALLERTON.2008.4797724\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ALLERTON.2008.4797724","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A game-theoretic approach to coding for information networks
Since its inception, network coding literature has, for the most part, assumed cooperation among users. In unicast applications where users have no inherent interest in providing (or concealing) their information to (or from) any destinations except for their unique one, this assumption must be reconsidered. In this paper, we examine the impact of selfish users on coding strategies by formulating network coding games, in which users strategies are their encoding/decoding schemes (including encoding functions, block length, rate, etc). Through the use of examples, we show that the rational outcomes of such network coding games are dependent on the particular network coding scheme implemented at intermediate nodes in the network. More specifically, we construct examples that show how careful construction of network coding schemes at intermediate nodes in the network can guarantee that efficient coding solutions will emerge as a rational outcome of the game, even when users are allowed complete freedom in choosing their coding schemes.