skip to main content


Title: Toward Automated Enforcement of Radio Interference
n many countries, sharing has become a significant approach to problems of spectrum allocation and assignment. As this approach moves from concept to reality, it is reasonable to expect an increase in interference or usage conflict events between sharing parties. Scholars such as Coase, Demsetz, Stigler, and others have argued that appropriate enforcement is critical to successful contracts (such as spectrum sharing agreements) and Polinsky, Shavell, and others have analyzed enforcement mechanisms in general. While many ex-ante measures may be used, reducing the social costs of ex-ante enforcement means shifting the balance more toward ex-post measures. Ex post enforcement requires detection, data collection, and adjudication methods. At present, these methods are ad hoc (operating in a decentralized way between parties) or fairly costly (e.g., relying on the FCC Enforcement Bureau). The research presented in this paper is the culmination of an NSF-funded inquiry into how and what enforcement functions can be automated.  more » « less
Award ID(s):
1642949
NSF-PAR ID:
10218697
Author(s) / Creator(s):
; ; ; ; ; ;
Date Published:
Journal Name:
Telecommunications Policy Research Conference
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. In many countries, sharing has become a significant approach to problems of spectrum allocation and assignment. As this approach moves from concept to reality, it is reasonable to expect an increase in interference or usage conflict events between sharing parties. Scholars such as Coase, Demsetz, Stigler, and others have argued that appropriate enforcement is critical to successful contracts (such as spectrum sharing agreements) and Polinsky, Shavell, and others have analyzed enforcement mechanisms in general. While many ex-ante measures may be used, reducing the social costs of ex-ante enforcement means shifting the balance more toward ex-post measures. Ex post enforcement requires detection, data collection, and adjudication methods. At present, these methods are ad hoc (operating in a decentralized way between parties) or fairly costly (e.g., relying on the FCC Enforcement Bureau). The research presented in this paper is the culmination of an NSF-funded inquiry into how and what enforcement functions can be automated. 
    more » « less
  2. null (Ed.)
    Cooperative wireless networks, enabled by Cognitive Radios, facilitate mobile users to dynamically share access to spectrum. However, spectrum bands can be accessed illegitimately by malicious users. Therefore, the success of dynamic spectrum sharing relies on automated enforcement of spectrum policies. While the focus has been on ex ante spectrum enforcement, this work explores new approaches to address efficient ex post spectrum enforcement. The main objective of this work is to ensure maximum coverage of the area of enforcement and accurate detection of spectrum access violation. The first objective is achieved with the help of Lloyd's algorithm to divide the enforcement area into a set of uniformly sized coverage regions. The interference detection accuracy is achieved through crowdsourcing of the spectrum access monitoring to volunteers, based on their computational capabilities, location attributes and reputation. A simulation framework was developed in CSIM19 (C++ version) to analyze the performance of the proposed system over the entire area of enforcement. The results show that the proposed scheme ensures efficient coverage of all the channels and regions in the area of enforcement and a high average accuracy of detection. 
    more » « less
  3. Peer review is an integral component of contemporary science. While peer review focuses attention on promising and interesting science, it also encourages scientists to pursue some questions at the expense of others. Here, we use ideas from forecasting assessment to examine how two modes of peer review—ex ante review of proposals for future work and ex post review of completed science—motivate scientists to favor some questions instead of others. Our main result is that ex ante and ex post peer review push investigators toward distinct sets of scientific questions. This tension arises because ex post review allows investigators to leverage their own scientific beliefs to generate results that others will find surprising, whereas ex ante review does not. Moreover, ex ante review will favor different research questions depending on whether reviewers rank proposals in anticipation of changes to their own personal beliefs or to the beliefs of their peers. The tension between ex ante and ex post review puts investigators in a bind because most researchers need to find projects that will survive both. By unpacking the tension between these two modes of review, we can understand how they shape the landscape of science and how changes to peer review might shift scientific activity in unforeseen directions. 
    more » « less
  4. To address the scarcity of spectrum, FCC mandated the dynamic sharing of spectrum among the different tiers of users. The success of spectrum sharing, however, relies on the automated enforcement of spectrum policies. We focus on ex post spectrum enforcement during/after the occurrence of a potentially harmful event, but before/after an actual harm has occurred. The major challenges addressed by us are to ensure maximum channel coverage in a given region of enforcement, accurate and reliable detection of enforcement, and selection of an efficient algorithm to select entities for detection of violation. We adopt a crowdsourced methodology to monitor spectrum usage. We ensure maximum coverage of the given area by dividing it into equal-sized regions and solve the enforcement problem by a divide and conquer mechanism over the entire region. We use a variant of the Multiple Choice Secretary algorithm to select volunteers. We finally simulate the enforcement framework and analyze the results. 
    more » « less
  5. Online commerce websites often request users to register in the online shopping process. Recognizing the challenges of user registration, many websites opt to delay their registration request until the end of the conversion funnel (i.e., ex post registration request). Our study explores an alternative approach by asking users to register with the website at the beginning of their shopping journey (i.e., ex ante registration request). Guided by a stylized analytical model, we conducted a large-scale randomized field experiment in partnership with an online retailer in the United States to examine how the ex ante request affects users’ registration decisions, short-term customer conversions, and long-term purchase behaviors. Specifically, we randomly assigned the new users in the website’s incoming traffic to one of two experimental groups: one with an ex ante registration request preceding the ex post request (treatment) and the other with only an ex post registration request (control). Our results show that the ex ante request leads to an increased probability of user registration; that is, the users in the treatment group, on average, are 58.08% relatively more likely to register with the website than those in the control group. Furthermore, the ex ante request leads to significant increases in customer purchases in the long run. Based on our estimation of the local average treatment effects, the ex ante registered users are 10.89% relatively more likely to make a purchase, place a 16.76% relatively greater number of orders, and generate 13.22% relatively higher total revenue for the firm in the long run. Finally, the ex ante request also does not impact customer conversion in the short-term. Further investigation into the long-term and short-term effects provides suggestive evidence on several potential mechanisms, such as firm-initiated interaction and screening of low-interest users. Our study provides managerial implications to the e-commerce websites on customer acquisition and contributes to the research on IT artifact design. 
    more » « less