Loading...
Search for: fairness
0.007 seconds
Total 54 records

    Design of a Traceable Optimistic Fair Exchange Protocol

    , M.Sc. Thesis Sharif University of Technology Ganjavi, Ramin (Author) ; Salmasizadeh, Mahmoud (Supervisor)
    Abstract
    Fair exchange of digital items through computer network is an important research topic of modern cryptography. Generallty, a fair exchange protocol is a way which helps two parties to exchange their digital items fairly, so that at the end of the protocol execution, both parties recieve their desirable items or none of them recieves anything. In a practical applications, fair exchange protocol is widely used in different but related fields like contract signing protocols,non-repudiation protocols,e-ayment system and certified e-mails. In a fair exchange protocol, a trusted third party (TTP) acts as an arbitrator between two parties. To reduce the traffic load of the arbitrator, the concept... 

    Fair and Efficient Cake Cutting

    , M.Sc. Thesis Sharif University of Technology Mirfakhar, Amir Mahdi (Author) ; Ghodsi, Mohammad (Supervisor)
    Abstract
    Cake Cutting is an old problem that studies how to allocate a resource among a number of agents to achieve fairness or maximize the revenue by selling the chunks fairly. The primary assumption in the conventional methods of studying Cake Cutting was that the allocator knows everything about the agents and their valuation functions for the different cuts of the cake, which could be impossible in real life. Here we addressed a new setting for an online Cake Cutting problem with unconnected pieces and studied four different objectives upon the setting. There we studied fair and efficient Online Cake Cutting by means of linear fairness and envy freeness. We also added a payment rule to study the... 

    A Study of Management Policies of Shared Resources in Modern SSDs with Multi-Programming

    , M.Sc. Thesis Sharif University of Technology Mohammad Hassani, Arghavan (Author) ; Sarbazi Azad, Hamid (Supervisor)
    Abstract
    Solid State Drives (SSDs) have an electronic architecture based on non-volatile memories. The unique merit of a SSD is its internal parallelism. Thus, adopting SSDs as the storage media in the storage systems in various devices, such as smart phones, personal computers, large workstations, and etc., improves the performance of the device, substantially. However, the conventional host interface protocols in SSDs, i.e. SATA and SAS, have critical limitations, like low bus bandwidth (maximum 12Gbps), and a single shared request queue. With such limitations, the host interface turns into a performance bottleneck in conventional SSDs. Therefore, the high performance provided by such SSDs cannot... 

    An Optimistic Fair Exchange Protocol for Proxy Signatures

    , M.Sc. Thesis Sharif University of Technology Ghorbani, Kosar (Author) ; Salmasizadeh, Mahmoud (Supervisor)
    Abstract
    Increasing use of World Wide Web and users tend to accompany in the electronic transaction has caused a fair exchange becomes very important and pervasive electronic transaction. These transactions have a lot of usage and benefits. In this study, the optimistic fair exchange has been studied. It is a special case of the fair exchange while having more advantages than the fair exchange. A situation considered that a signer could not sign a message by himself so he delegates his right in signing to a person as a proxy signer. In this study, a protocol of optimistic fair exchange for proxy signature is presented. So, the proxy signer can accompany in the optimistic fair exchange instead of the... 

    Stale Pricing in Mutual Funds

    , M.Sc. Thesis Sharif University of Technology Aliabadi Farahani, Ebrahim (Author) ; Barakchian, Mahdi (Supervisor) ; Ebrahimnejad, Ali (Supervisor)
    Abstract
    One of the advantage of the mutual funds is their liquidity. They should pay back investor’s money based on Net Asset Value (NAV) anytime they request. Sometimes, NAV computed by fund is different from the real value of it. This error in pricing could be more intense in Iran because Iran stock market liquidity is low, ticker become closed frequently, and stocks can’t be traded and the change of price in one day has the limitation. All of these reasons make the price of stock in Iran stale which doesn’t contain the latest market information. The staleness of stock price makes the return of funds predictable and provide the opportunity of arbitrage which causes the transfer of the wealth among... 

    Differential Item Functioning (DIF)in Terms of Gender in a High Stakes Test

    , M.Sc. Thesis Sharif University of Technology Tayebi, Alireza (Author) ; Salehi, Mohammad (Supervisor)
    Abstract
    Validation is an important enterprise especially when the test to be validated is a high-stakes one the results of which bring about life-changing implications for the candidates (Roever, 2001). Messick’s (1988) notion of construct irrelevant factors is pertinent in test validation. Demographic variables like gender, field of study and age can affect test results and interpretations. A fair test needs to be neutral when it comes to construct irrelevant factors such as gender. Differential Item Functioning is a way of making sure that the test does not favor one group of test takers over the others. The current study investigated differential item functioning (DIF) in terms of gender in the... 

    Fair and Strategic Division of Resources

    , Ph.D. Dissertation Sharif University of Technology Seddighin, Masoud (Author) ; Ghodsi, Mohammad (Supervisor)
    Abstract
    In this study, we consider the fair division problem. In this problem, a heterogeneous resource must be fairly divided among a set of agents with different preferences.The resource can be either a divisible good (i.e., time, land), or a set of indivisible goods. When the resource is a single divisible good, the problem is commonly known as cake cutting. To measure fairness, several notions are defined, i.e., envy-freeness, proportionality, equability, maximin-share. In this thesis, we first give a formal definition of these notions. Next, we present our results for envy-freeness and maximin-share.First, we prove the existence of an allocation that guarantees each agent a factor 3/4 of his... 

    Opportunistic Fair Resource Allocation for Multi-Cell Wireless Networks

    , M.Sc. Thesis Sharif University of Technology Shahsavari, Shahram (Author) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    In recent years, introduction of new technologies has highlighted the need to more data rate in mobile networks. Classical methods of resource allocation in mobile networks cannot respond to this huge demand for data rate because of their limitations. Resource allocation, as one of the operators’ tasks, plays a key role in the network efficiency and users’ data rate. Opportunistic resource allocation and scheduling have gained attention in recent years. On the other, using single-channel (frequency reuse-1) networks is also one of the methods to improve data rate in mobile networks. It is expected that the use of opportunistic scheduling in single-channel networks can repond to the huge... 

    Improving Throughput and Secrecy Throughput Performance in Wireless Powered Communication Networks

    , Ph.D. Dissertation Sharif University of Technology Rezaei Estakhrooeieh, Roohollah (Author) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    In wireless powered communication networks (WPCNs), wireless nodes are charged via an access point. In these networks, an access point transfers power to the nodes, and then, the nodes use the received power to transmit their information to the access point. Due to the wireless transmission of the information, eavesdropping of it is an important vulnerability in these networks. The conventional method to resolve this security problem is using cryptography algorithms. However, this method needs key management and complex encryption algorithms to be used by the nodes, which may not be applicable. Physical layer security (PLS), which uses the channel characteristics, is a more suitable way to... 

    Performance Evaluation of Applied Scheduling Algorithms Based on Weighted Fair Queuing for Elastic Traffic

    , M.Sc. Thesis Sharif University of Technology Allahyar, Ehsan (Author) ; Movaghar Rahimabadi, Ali (Supervisor)
    Abstract
    Queuing algorithms are used in packet forwarding elements such as routers or switches and the goal is to minimize transmission delays as well as to help manage network congestions. On the other hand, over 90 to 95% of the packets in the Internet use TCP and correspond to the transfer of digital documents of one form or another (Web pages, data files, MP3 tracks etc.) ; this kind of traffic is called elastic. In this thesis, we present a new Start-time Fair Queuing (SFQ) algorithm called Weighted Start-time Fair Queuing (WSFQ) which is more efficient and achieves better fairness than SFQ in the presence of small and huge elastic traffic flows. WSFQ scheduler, like SFQ uses a start time... 

    Adaptive modulation technique for amplify & forward cooperative diversity and fairness analysis

    , Article 2008 International Conference on Telecommunications, ICT, St. Petersburg, 16 June 2008 through 19 June 2008 ; October , 2008 ; 9781424420360 (ISBN) Yazdian, E ; Pakravan, M. R ; Sharif University of Technology
    2008
    Abstract
    In recent years, cooperative diversity techniques have gained increased attention as a new method to combat degrading channel effects. Cooperation among two or more single antenna users generates a virtual diverse multiple-antenna transmission system in the wireless network. In this paper, we propose a scheme to improve the spectral efficiency of the Amplify and Forward system and investigate the application of adaptive modulation concept to the performance of cooperative techniques. We consider the adaptation of rate and power allocation with MQAM modulation and study the performance of Amplify & Forward scenarios in Rayleigh fading channels. We compare this system with its comparable... 

    Bacterial foraging search in unstructured P2P networks

    , Article Canadian Conference on Electrical and Computer Engineering ; 2014 Sharifkhani, F ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    In this paper, a new search algorithm in heterogeneous hierarchical unstructured p2p networks is presented which takes into account heterogeneity of peers such as upload bandwidth, life time in the network and process capacity in its peer discovery policy as factors that influence download performance and user satisfaction. One advantage of this algorithm is that it can be performed in a completely unstructured network without imposing any change on network topology and file replication. However, it obviously decreases file download time as it is designed to discover broad-bandwidth nodes with a higher probability. This property results in a fair distribution of load over heterogeneous p2p... 

    Joint cell muting and user scheduling in multicell networks with temporal fairness

    , Article Wireless Communications and Mobile Computing ; Volume 2018 , 2018 ; 15308669 (ISSN) Shahsavari, S ; Akar, N ; Khalaj, B. H ; Sharif University of Technology
    Hindawi Limited  2018
    Abstract
    A semicentralized joint cell muting and user scheduling scheme for interference coordination in a multicell network is proposed under two different temporal fairness criteria. In the proposed scheme, at a decision instant, each base station (BS) in the multicell network employs a cell-level scheduler to nominate one user for each of its inner and outer sections and their available transmission rates to a network-level scheduler which then computes the potential overall transmission rate for each muting pattern. Subsequently, the network-level scheduler selects one pattern to unmute, out of all the available patterns. This decision is shared with all cell-level schedulers which then forward... 

    On the relevance of fair sampling assumption in the recent bell photonic experiments

    , Article Journal of Modern Optics ; Volume 52, Issue 10 , 2005 , Pages 1405-1414 ; 09500340 (ISSN) Shafiee, A ; Golshani, M ; Sharif University of Technology
    2005
    Abstract
    In the experimental verification of Bell's inequalities in real photonic experiments, it is generally believed that the so-called fair sampling assumption (which means that a small fraction of results provide a fair statistical sample) has an unavoidable role. Here, we want to show that the interpretation of these experiments could be feasible, if some different alternative assumptions other than the fair sampling were used. For this purpose, we derive an efficient Bell-type inequality which is a CHSH-type inequality in real experiments. Quantum mechanics violates our proposed inequality, independent of the detection-efficiency problems. © 2005 Taylor & Francis Group Ltd  

    Expand the shares together: envy-free mechanisms with a small number of cuts

    , Article Algorithmica ; 2018 ; 01784617 (ISSN) Seddighin, M ; Farhadi, M ; Ghodsi, M ; Alijani, R ; Tajik, A. S ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    We study the problem of fair division of a heterogeneous resource among strategic players. Given a divisible heterogeneous cake, we wish to divide the cake among n players to meet these conditions: (I) every player (weakly) prefers his allocated cake to any other player’s share (such notion is known as envy-freeness), (II) the allocation is dominant strategy-proof (truthful) (III) the number of cuts made on the cake is small. We provide methods for dividing the cake under different assumptions on the valuation functions of the players. First, we suppose that the valuation function of every player is a single interval with a special property, namely ordering property. For this case, we... 

    Externalities and fairness

    , Article 2019 World Wide Web Conference, WWW 2019, 13 May 2019 through 17 May 2019 ; 2019 , Pages 538-548 ; 9781450366748 (ISBN) Seddighin, M ; Saleh, H ; Ghodsi, M ; Amazon; Bloomberg; Criteo AI Lab; et al.; Google; Microsoft ; Sharif University of Technology
    Association for Computing Machinery, Inc  2019
    Abstract
    One of the important yet insufficiently studied subjects in fair allocation is the externality effect among agents. For a resource allocation problem, externalities imply that the share allocated to an agent may affect the utilities of other agents. In this paper, we conduct a study of fair allocation of indivisible goods when the externalities are not negligible. Inspired by the models in the context of network diffusion, we present a simple and natural model, namely network externalities, to capture the externalities. To evaluate fairness in the network externalities model, we generalize the idea behind the notion of maximin-share (MMS) to achieve a new criterion, namely,... 

    Expand the shares together: envy-free mechanisms with a small number of cuts

    , Article Algorithmica ; Volume 81, Issue 4 , 2019 , Pages 1728-1755 ; 01784617 (ISSN) Seddighin, M ; Farhadi, M ; Ghodsi, M ; Alijani, R ; Tajik, A. S ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    We study the problem of fair division of a heterogeneous resource among strategic players. Given a divisible heterogeneous cake, we wish to divide the cake among n players to meet these conditions: (I) every player (weakly) prefers his allocated cake to any other player’s share (such notion is known as envy-freeness), (II) the allocation is dominant strategy-proof (truthful) (III) the number of cuts made on the cake is small. We provide methods for dividing the cake under different assumptions on the valuation functions of the players. First, we suppose that the valuation function of every player is a single interval with a special property, namely ordering property. For this case, we... 

    Precoding in relay networks with frequency selective channels

    , Article Conference Record - Asilomar Conference on Signals, Systems and Computers ; 2012 , Pages 537-541 ; 10586393 (ISSN) ; 9781467350518 (ISBN) Schad, A ; Khalaj, B ; Pesavento, M ; Sharif University of Technology
    Abstract
    We consider a wireless network with one source, multiple relays and multiple destinations. The source and the relays are assumed to utilize multiple antennas. To reduce the effects of the frequency selective source-to-relay and relay-to-destination channels, and to compensate for the different delays of the various signal paths in the network and for multi-user interference and noise, the source, the relays and the destinations apply linear filtering to their signals. The proposed scheme generalizes the recently proposed filter-and-forward relaying scheme. We propose an iterative algorithm to solve the problem of maximizing the quality-of-service at the destinations. Simulation results... 

    Saturated hydraulic conductivity of problematic soils measured by a newly developed low-compliance triaxial permeameter

    , Article Engineering Geology ; Volume 278 , 2020 Sadeghi, H ; AliPanahi, P ; Sharif University of Technology
    Elsevier B.V  2020
    Abstract
    Research on the reliable characterization of saturated permeability has received great yet necessary attention globally. However, most studies were carried out on soils with a volumetric tendency being almost insensitive to water saturation or at least with this hidden assumption. This is clearly not the case when dealing with the two broad categories of problematic soils, including collapsible and expansive soils. As confirmed by previous research, at least one-fifth of the planet comprises of these soils with a relatively fair distribution. Therefore, the main objective of this study is to introduce a low-compliance double cell/burette permeameter to track all volumetric changes during the... 

    Secrecy throughput maximization for full-duplex wireless powered IOT networks under fairness constraints

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 4 , 2019 , Pages 6964-6976 ; 23274662 (ISSN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full-duplex multiantenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first aim to optimize the sum secrecy throughput of the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The optimization problem is shown to...