Classification of Network Traffic via Packet-Level Hidden Markov Models
|
|
- Abner Lang
- 8 years ago
- Views:
Transcription
1 Classfcaton of Network Traffc va Packet-Level Hdden Markov Models Alberto Danott, Walter de Donato, Antono Pescapè Department of Computer Scence and Systems Unversty of Naples Federco II {alberto, walter.dedonato, Perlug Salvo Ross Department of Electroncs and Telecommuncatons Norwegan Unversty of Scence and Technology Abstract Traffc classfcaton and dentfcaton s a fertle research area. Beyond Qualty of Servce, servce dfferentaton, and bllng, one of the most mportant applcatons of traffc classfcaton s n the feld of network securty. Ths paper proposes a packet-level traffc classfcaton approach based on Hdden Markov Model (HMM). Classfcaton s performed by usng real network traffc and estmatng - n a combned fashon - Packet Sze (PS) and Inter Packet Tme (IPT) characterstcs, thus remanng applcable to encrypted traffc too. The effectveness of the proposed approach s evaluated by consderng several traffc typologes: we appled our model to real traffc traces of Age of Mythology and Counter Strke (two Mult Player Network Games), HTTP, SMTP, Edonkey, PPlve (a peer-to-peer IPTV applcaton), and MSN Messenger. An analytcal bass and the mathematcal detals regardng the model are gven. Results show how the proposed approach s able to classfy network traffc by usng packet-level statstcal propertes and therefore t s a good canddate as a component for a mult-classfcaton framework. I. INTRODUCTION Network traffc classfcaton s the process of analyzng traffc flows and assocatng them to dfferent categores of network applcatons and t represents an essental task n the whole chan of network securty. Studes n the feld of traffc classfcaton started n the last years, when the tradtonal use of transport protocol ports for classfcaton purposes became unrelable whle dfferent knds of new network applcatons were emergng (multplayer network games, p2p IPTV, fle sharng). Beyond the need to understand whch knd of traffc s carred on the Internet lnks, other man motvatons for lookng for new and relable traffc classfcaton technques today are to offer proper Qualty of Servce (QoS) dependng on the category of traffc carred by flows, and to perform a bllng not only based on bandwdth usage but also on the traffc category. However, n addton to these ssues, some of the most mportant and wdely spread applcatons of traffc classfcaton pertan to network securty: () the enforcement of securty polces on the use of dfferent applcatons; () the ablty to classfy encrypted traffc; () the dentfcaton of malcous traffc flows. For these reasons, several new approaches to traffc classfcaton are beng proposed and studed. As of today, though, no defntve answer s present. The debate n the scentfc communty s stll open, and, as t happened n the recent past for ntruson detecton systems [], Ths work has been partally supported by PRIN 27 RECIPE Project, by CONTENT NoE, and NETQOS EU projects, by WILATI+ project. approaches based on the jont work of dfferent traffc classfcaton technques (mult-classfcaton) seem to be among the more promsng solutons. New trends n network applcatons and protocol desgn, ndeed, make traffc classfcaton partcularly dffcult. Protocol encapsulaton, encrypted transmsson, use of non-standard ports, concerns related to users prvacy, and need to keep up wth huge traffc loads on network lnks are posng tremendous lmts to some of the developed technques. Payload nspecton technques, for example, make applcaton dentfcaton dffcult or even mpossble under some of the above-cted condtons (manly for both prvacy and performance ssues). On the other sde, approaches based on statstcal propertes of the network traffc are lookng more promsng and robust to encrypton, protocol obfuscaton, prvacy, etc. In ths paper we propose a novel classfcaton technque based on packet-level statstcal propertes of network traffc exhbted by dfferent applcatons. Specfcally, we propose the use of Packet-Level Hdden Markov Models (PL-HMMs), that we have proposed and valdated n the past for modelng purposes [2]. In ths work we present the algorthms, the statstcal propertes taken n consderaton, and we test the proposed classfcaton approach on a set of applcaton traffc that ranges from tradtonal network applcatons (e.g. HTTP, Emal) to more recent ones as network games and peer-topeer vdeo streamng. The presented results are encouragng and show that the proposed PL-HMM approach may be a good canddate as a technque to be used n a mult-classfcaton scenaro (that s, when dfferent classfcaton engnes are used and ther output s combned by a decson system). The rest of the paper s organzed as follows. In Secton II a bref descrpton of the motvatons s gven. Secton III provdes detals on the analytcal model at the base of our classfer. Secton IV dscusses the applcatons consdered and the measurement approach. Fnally, n Secton V we show results of traffc classfcaton. Secton VI ends the paper. II. MOTIVATION AND RELATED WORK Several classfcaton technques have recently been presented n lterature. Approaches based on deep payload nspecton are usually consdered very relable for traffc that s not encapsulated nto other applcaton-level protocols and for un-encrypted traffc. However, the current trends show that /8/$ IEEE. Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE "GLOBECOM" 28 proceedngs.
2 the porton of encrypted traffc on the Internet s constantly ncreasng [3], and several applcatons are usng protocol encapsulaton or obfuscaton to evade network polcy enforced through flterng [4]. Moreover, access to full payload s often not possble (e.g. due to prvacy ssues). For these reasons, researchers are proposng approaches that look more robust because based on the ntrnsc propertes of the network traffc as t s generated by dfferent applcatons. Flow-level parameters (e.g. flow duraton, transmtted bytes, transmtted packets) are a popular choce, a vald alternatve or combnaton s to explot measurements comng from packet level (e.g. packet sze, nter-packet tmes). Several notable works [5] [6] [7] [8] [9] presented n lterature consder some of these propertes to buld classfcaton features, and then use statstcal or machne learnng approaches to classfcaton. Results show that a perfect classfcaton approach does not exst. The use of dfferent features and classfers can brng more accuracy under some condtons or n dentfyng some applcatons whle may not be satsfyng n other cases. It s therefore probable that n the future we wll see mult-classfer approaches, able to collect the advantages of dfferent technques and compensate for each weakness, beng proposed. In ths paper we propose a technque for traffc classfcaton based on a statstcal approach that takes nto account some new packet-level propertes of network traffc, tryng to offer a contrbuton n terms of technques to explot ntrnsc propertes of traffc generated by dfferent network applcatons. Indeed, as explaned n the followng sectons, the use of PL- HMMs allows us to take nto account jont characterstcs of nter-packet tmes (IPT) and payload sze (PS), as well as ther temporal correlaton. We use studes from our modelng work based on HMMs [2]: the traffc generated by a specfc applcaton s modeled as a flow of packets, seen as a sequence of (IPT,PS) pars generated accordng to dfferent dstrbutons dependng on the hdden state of the source. In [8], HMMs have been used, and compared wth other technques, for traffc classfcaton of flows at an early stage. Sequences made of only the frst 4 to packets were used to tran HMMs and to attempt flow classfcaton. However, dfferently from our work, only packet szes were consdered n ths paper. An approach based on profle HMMs has been proposed n []. Ths work s very dfferent from ours, n that the authors present two separate classfers workng separately on IPTs or on PSs, and a left-to-rght structure for the state topology of the HMM s used. However, a proposal for extendng ther approach was later presented n a techncal report [], where they try to account for jont IPT and PS modelng va vector quantzaton. Proposed profle HMMs n [] present a very complex state structure dependng on the length of the tranng sequence, wth a par of dfferent states for each packet. They are desgned for one-dmensonal observable varables. IPT and PS jont nformaton s taken nto account va vector quantzaton, thus a codebook labelng IPT and PS allowed pars s used as observable varable. Furthermore, a heurstc technque, namely model surgery, s needed to account for dfferent trace lengths. As t wll IPT PS sequence PL HMM λ PL HMM n PL HMM N λ n λ N argmax(.) traffc class Fg.. Archtecture of the classfer. be clear n the next secton, compared to [], the model proposed n ths paper works drectly on a two-dmensonal observable varable, thus explots IPT and PS jont nformaton wthout needng any pre-processng lke vector quantzaton. Our approach presents a fully-connected structure for the state topology that allows an enormous reducton of the number of states, avods post-processng lke model surgery, and although beng much less structured than the profle HMMs wth respect to the traffc characterstcs s stll able to acheve good classfcaton results. III. THE ANALYTICAL MODEL Notaton - Column vectors are denoted wth lower-case bold letters, wth a denotng the th element of vector a; matrces are denoted wth upper-case bold letters, wth A,j denotng the (, j)th element of matrx A; (.) T and E{.} denote transpose and expectaton operators; a b = b denotes the condtonal random varable a gven that b = b ; the symbol means dstrbuted as. Fgure shows the general system archtecture that we are consderng for traffc classfcaton. It s composed by a bank of parallel PL-HMMs and a mult-nput sngle-output block pontng at the maxmum nput. In order to capture the characterstcs of N dfferent typologes of network traffc, t s assumed that the N dfferent PL-HMMs n the bank have been obtaned va the Baum-Welch tranng proposed n [2]. The Baum-Welch algorthm [2] s an teratve procedure that looks for model parameters maxmzng the probablty that the model tself generates the sequences used as tranng set. Each PL-HMM of the bank s then used to compute the lkelhood (λ n ), representng the probablty that the test sequence belongs to the traffc typology assocated to the PL- HMM. The maxmum lkelhood then selects the best estmate for the traffc typology. A. PL-HMM The sngle PL-HMM s an HMM composed by a dscrete hdden state varable x[l] {s,...,s K } and a contnuous bdmensonal observable varable, y[l] =(d[l],b[l]) T, where K denotes the number of the states for the HMM, d[l] denotes log (IPT/µs) and b[l] denotes PS of the lth packet. IPT and PS are jontly descrbed wth memory and correlaton /8/$ IEEE. Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE "GLOBECOM" 28 proceedngs.
3 taken nto account by the state varable, and assumed statstcally ndependent gven the state. The sngle PL-HMM s characterzed by the set of parameters M = {A, g (t), w (t), g (p), w (p) }, denotng the state transton matrx, the condtonal IPT and PS dstrbuton vectors, respectvely,.e. A,j =Pr(x[l +]=s j x[l] =s ); d[l] x[l] =s Gamma(g (t),w (t),w (p) ); b[l] x[l] =s Gamma(g (p) ). It s apparent the Markovan assumpton for the hdden state. The condtonal (n th state) pdf s for IPT and PS, are f (t) (d) = (d/w(t) f (p) (b) = (b/w(p) ) g(t) e (d/w(t) ) w (t) Γ(g (t) ) ) g(p) e (b/w(p) ) w (p) Γ(g (p) ) (d >), (b >). It s worth notcng that, accordng to our notaton, the IPT-PS sequence Y = (y[],...,y[l]) corresponds to the followng par of sequences: D = (d[],...,d[l]) for IPT values and B =(b[],...,b[l]) for PS values. B. Lkelhood Computaton The lkelhood λ =Pr(Y M) of an IPT-PS sequence Y, gven the model M, s computed explotng the dependences captured by the model n both forward and backward drectons. The Forward-Backward algorthm [2] s an effcent technque to compute the Forward varable α and the Backward varable β n a graphcal model,.e. the varables capturng such dependences. More specfcally, for HMM structures t s based on the followng equatons α j [l] = α [l ]A,j f (t) j (d[l])f (p) j (b[l]), β [l] = = j= A,j f (t) j (d[l +])f (p) j (b[l +])β j [l +]. Basng on these formulas, the lkelhood for an IPT-PS sequence Y s computed as λ =Pr(Y M)= α [l]β [l], = for an arbtrary l. The Forward-Backward algorthm s typcally mplemented n the log-doman. C. Traned PL-HMMs Our PL-HMMs present K =4to K =7states, dependng on the complexty of the protocol. We tred to keep the number of states as low as possble n order to contan computatonal complexty, and at the same tme provde suffcent accuracy n modelng the characterstcs of a specfc a network-traffc typology. The set of parameters for the tranng algorthm s chosen n order to cover almost unformly the whole range of observed IPT and PS values. Convergence of the Baum-Welch occurrences occurrences IPT hstogram & IPT pdf dbµ PS hstogram & PS pdf bytes (a) Normalzed hstogram of the tranng set, pdf of the PL- HMM, pdf of the PL-HMM. covarance covarance.5 between IPT and IPT between PS and IPT covarance covarance.5 between IPT and PS between PS and PS (b) IPT-PS auto- and cross-covarance for the tranng set, the PL-HMM, the PL-HMM. Fg. 2. PL-HMM characterstcs. tranng for all typologes was reached n a few (less than ) teratons. Fgure 2 shows the characterstcs of the PL-HMM to model SMTP traffc (please refer to Secton IV for a descrpton of all the applcatons consdered n ths work). From ths fgure, t s clear how frst and second order statstcs are captured by the model. Ths s shown also to gve an ntutve dea of how packet-level propertes related to margnal dstrbutons, tme dependence, and mutual dependence between IPT and PS, are captured by a PL- HMM made of few parameters, that can then be exploted for classfcaton purposes. Table I shows the state parameters for the PL-HMM n whch each state corresponds to a dfferent short-tme behavor of the applcaton n terms of IPT and PS generaton, for more detals refer to [2]. Smlar behavor n terms of modelng capabltes have been obtaned for each of the traffc typologes descrbed n Secton IV. Global statstcs (average value and standard devaton) of /8/$ IEEE. Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE "GLOBECOM" 28 proceedngs.
4 TABLE I SMTP: STATE PARAMETERS. PS IPT g (t) w (t) g (p) w (p) st state nd state rd state th state th state TABLE II TRAINING SETS STATISTICS. IPT [dbµ] PS [bytes] mean std dev. mean std dev. AoM CS Edonkey HTTP MSN PPLve SMTP the tranng sets used to characterze each traffc typology are shown n Table II. It s easy to notce that IPT and PS jont characterzaton s needed n order to am at successful classfcaton. Also, analyzng dfferences and smlartes among traffc characterstcs, t s not surprsng that, antcpatng the results shown n Secton V, AoM and PPlve wll present the two best performance for correct classfcaton, whle the the worst performance for msclassfcaton wll be when confusng Edonkey wth SMTP and SMTP wth MSN. IV. CONSIDERED APPLICATIONS AND MEASUREMENT APPROACH We tested our algorthm over a heterogeneous set of network applcatons, shown n Table III. Each of them were verfed through deep payload nspecton and manual checks. The choce of the consdered applcatons to classfy was drven by the followng multdmensonal crtera: () both TCP and UDP based applcatons; () both and sgnalng traffc; () both tradtonal and novel Internet applcatons. As for TCP-based and tradtonal applcatons we consdered the traffc of HTTP and SMTP (respectvely related to Web and Emal), stll responsble for a relevant porton of the overall Internet traffc. Agan, n the class of TCP-based applcatons and stll fallng n the category of tradtonal Internet applcatons, we consdered Instant Messengng. It s used by about 5% of the Internet users all around the world [3], wth MSN Messenger (MSN n the followng) beng the most popular applcaton. In ths work we consder the traffc generated by MSN clents [4]. Also, as last TCP-based applcaton we consdered the traffc assocated to the Edonkey protocol [5], used by peer-to-peer fle sharng applcatons as Emule. Ths category of traffc s qute novel (compared to Web and Emal traffc) and t s partcularly mportant because most of the ssues related to the nablty to dentfy applcatons through protocol ports started wth respect to peer-to-peer fle sharng applcatons. As regard UDP-based and nnovatve (and wth QoS requrements) applcatons, we consdered the traffc generated by Age of Mythology (AoM) [6], a Real Tme Strategy Multplayer game, and CounterStrke (CS) [7], one of the most played Frst Person Shooter games on the Internet. TABLE III CONSIDERED TRAFFIC Tranng Test flows packets bytes flows packets bytes AoM M K CS M K Edonkey M M HTTP M M MSN M M PPlve K K STMP M M Fnally, a category of traffc that s now constantly ncreasng s peer-to-peer vdeo streamng. Trple-player Operators are nterested n dentfyng and classfyng ths traffc wthout damagng the prvacy of the users. For ths reason, we consdered the sgnalng traffc generated by the PPlve applcaton. Therefore, accordng to our multdmensonal crtera, ths last traffc typology falls n the class composed by the trple: UDPbased applcaton, nnovatve Internet servce, sgnalng traffc. To stress the mportance of peer-to-peer vdeo streamng traffc n current networks, t s worth notcng that we prevously studed the traffc generated by PPlve and, whle we were able to recognze that the sgnalng nformaton was transmtted through UDP packets and the vdeo was carred by TCP packets, we were not able to relably dentfy all the vdeo streamng flows on TCP. Thus confrmng that, from the Operator pont of vew, the ablty to recognze sgnalng traffc nstead of traffc s of ndsputable mportance. Except for network games, all the traffc was captured at Unversty of Naples Federco II, Italy, wth the traffc from peer-to-peer applcatons generated by a set of controlled boxes. The AoM traces, nstead, have been provded by the Worcester Polytechnc Insttute, MA (USA) [8]. Whereas the CS traces have been already used for a study on network games traffc modelng [9]. Accordng to the results shown n [2] we can state that the tme nvarance of IPT does not affect the classfcaton process (based on both IPT and PS). We consdered the conventonal defnton of flows - gven by the 4-tuple: source IP, source port, destnaton IP, destnaton port - wth a tmeout of 6 seconds. In ths study we took nto account only traffc extng from observed hosts (e.g. packets wth destnaton port 8 or 25 for HTTP and SMTP respectvely, packets sent by observed machnes n the case of peer-to-peer applcatons, etc.), neglectng flows n the opposte drecton. We separated the avalable flows n two separate sets: a tranng set used for tranng the PL- HMM and thus buldng the models, and a test set used to verfy the classfer. Flows wth less than packets have been excluded both from tranng and test sets n order to avod numercal problems runnng the algorthms. From each consdered flow we extracted sequences of IPT and PS. Snce we wanted to characterze the traffc generated by the applcatons, ndependent as much as possble of the transport protocols, we dropped all packets wth empty payload, as TCPspecfc traffc, lke connecton establshment packets (SYN- ACK-SYNACK) and pure acknowledgment packets. For the same reason, n the estmaton of the PS, we measured the byte length of the TCP/UDP payload /8/$ IEEE. Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE "GLOBECOM" 28 proceedngs.
5 TABLE IV CLASSIFICATION RESULTS: CONFUSION MATRIX AoM CS Edonkey HTTP MSN PPlve SMTP AoM.%.%.%.%.%.%.% CS 2.94% 93.53% 2.94%.%.29%.%.29% Edonkey.%.22% 9.24%.22% 2.44%.22% 3.66% HTTP.%.4%.3% 93.35% 2.8%.49% 2.7% MSN.%.3% 2.34%.94% 94.6%.% 2.43% PPlve.%.%.64%.64%.9% 96.82%.% SMTP.% 2.4% 2.23% 2.25% 3.25%.% 9.23% V. EXPERIMENTAL RESULTS In Table IV we show, summarzed through a confuson matrx, the results of the classfcaton performed on the test sets. Each row represents n percentage the output of a run of the classfer over a dfferent applcaton test set (e.g. the cell correspondng to the HTTP row and Edonkey column tells us that.3% of the flows from the HTTP test set have been erroneously classfed as Edonkey). All the correct classfcaton percentages are shown on the dagonal n bold. We can see that for all the applcatons a correct classfcaton percentage above 9% s acheved, wth the best results obtaned when tryng to dentfy AoM and PPlve traffc. For AoM the % percentage value s manly explaned wth the very reduced number of flows of the test set, however t s mportant to note that the confuson values observable on the AoM column show that t almost never happens that flows from dfferent applcatons are erroneously classfed as AoM (ths actually happens only for CounterStrke whch s a game over UDP as AoM), demonstratng that the AoM model s very strct n capturng AoM traffc propertes. The worst results are obtaned when tryng to dentfy Edonkey or SMTP traffc. Here we see that there are several flows that are confused wth other applcatons. Probably the consdered statstcal propertes of such flows do not ft wth ther correspondng models. However, ths s a typcal stuaton n whch a mult-classfer system may overrde the weaknesses of a sngle approach by countng also on dfferent classfcaton technques based on other propertes. Moreover, t s worth notcng that n ths work we consdered only traffc n one drecton for each host, whereas by buldng models also for the other way and explotng the bond between correspondng flows n the two drectons (beng both generated by the same applcaton) t may be possble to acheve a better accuracy. The extenson of the classfer amng to process both traffc drectons at the same tme s currently under nvestgaton. VI. CONCLUSION Traffc classfcaton represents an essental task for both network management archtectures [23] and network securty solutons [24]. In ths paper we proposed an approach for traffc classfcaton based on HMMs appled to packet-level traffc parameters. Our approach, by jontly consderng IPT and PS and takng nto account also ther temporal structures, s able to classfy a number of traffc typologes (TCP and UDP based, and sgnalng, tradtonal and novel Internet applcatons). We showed how the technque s able to acheve promsng results such that t may be consdered as one of the technques to be used n a mult-classfer system. Our ongong work s devoted to both prelmnary longtudnal/portablty analyss (.e. tranng and testng stage usng dfferent traffc traces) and enlarge the set of consdered traffc typologes. Moreover we plan to compare performance aganst other classfers. REFERENCES [] G. Gacnto, F. Rol, L. Ddac, Fuson of multple classfers for ntruson detecton n computer networks, Pattern Recognton Lett., Vol. 24, no. 2, pp , Aug. 23. [2] A. Danott, A. Pescapé, P. Salvo Ross, G. Iannello, G. Ventre, F. Palmer, An HMM Approach to Internet Traffc Modelng, IEEE Global Telecommun. Conf. (GLOBECOM), pp. 6, Dec. 26. [3] Mar. 28. [4] T. Karaganns, A. Brodo, N. Brownlee, K.C. Claffy, M. Faloutsos, Is P2P dyng or just hdng?, IEEE Global Telecommun. Conf. (GLOBE- COM), pp , Dec. 24. [5] S. Zander, T. Nguyen, G. Armtage, Automated traffc classfcaton and applcaton dentfcaton usng machne learnng, IEEE LCN, pp , Nov. 25. [6] M. Crott, F. Grngol, P. Pelosato, L. Salgarell, A Statstcal Approach to IP-level classfcaton of network traffc, IEEE Int. Conf. Commun. (ICC), pp. 7 76, Jun. 26. [7] J. Erman, A. Mahant, M. Arltt, Internet Traffc Identfcaton usng Machne Learnng, IEEE Global Telecommun. Conf. (GLOBECOM), pp. 6, Dec. 26. [8] L. Bernalle, R. Texera, K. Salamatan, Early Applcaton Identfcaton, ACM Co-Next, 26 [9] T. Auld, A.W. Moore, S.F. Gull, Bayesan Neural Networks for Internet Traffc Classfcaton, IEEE Trans. Neural Networks, Vol. 8, no., pp , Jan. 27. [] C. Wrght, F. Monrose, G. Masson, HMM Profles for Network Traffc Classfcaton, VzSEC/DMSEC, pp. 9 5, Oct. 24. [] C. Wrght, F. Monrose, G. Masson, Towards better protocol dentfcaton usng profle HMMs, JHU Tech. Rep. JHU-SPAR52, Jun. 25. [2] L.R. Rabner, A tutoral on Hdden Markov Models and Selected Applcatons n Speech Recognton, Procs. IEEE, Vol. 77, no. 2, pp , Feb [3] Sep. 27. [4] Sep. 27. [5] Mar. 28. [6] Mar. 28. [7] Mar. 28, [8] Sep. 27. [9] W. Feng, F. Chang, W. Feng, J. Walpole, A Traffc Characterzaton of Popular On-lne Games, IEEE/ACM Trans. Networkng, Vol. 3, no. 3, pp , Jun. 25. [2] A. Botta, A. Danott, A. Pescapé, G. Ventre, Searchng for Invarants n Network Games Traffc, Poster at Co-Next 26 Student Workshop. [2] sa/2/mantan/samsec.mspx, Sep. 27. [22] overvew.php, Sep. 27. [23] H. Jang, A.W. Moore, Z. Ge, S. Jn, J. Wang, Lghtweght Applcaton Classfcaton for Network Management, SIGCOMM Work. Internet Network Manag., Aug. 27. [24] O. Marques, P. Ballargeon, Desgn of a multmeda traffc classfer for Snort, Informaton Manag. & Computer Securty J., Vol. 5, no. 2, Jun /8/$ IEEE. Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE "GLOBECOM" 28 proceedngs.
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationStochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationA Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification
IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationAn Empirical Study of Search Engine Advertising Effectiveness
An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman
More informationStatistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationCS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements
Lecture 3 Densty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there
More informationFREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES
FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationHow To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network
Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationRelay Secrecy in Wireless Networks with Eavesdropper
Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,
More informationA Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems
roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang
More informationFace Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)
Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton
More informationHowHow to Find the Best Online Stock Broker
A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationL10: Linear discriminants analysis
L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss
More informationSingle and multiple stage classifiers implementing logistic discrimination
Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,
More informationEnabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationBayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending
Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success
More informationSketching Sampled Data Streams
Sketchng Sampled Data Streams Florn Rusu, Aln Dobra CISE Department Unversty of Florda Ganesvlle, FL, USA frusu@cse.ufl.edu adobra@cse.ufl.edu Abstract Samplng s used as a unversal method to reduce the
More informationA cooperative connectionist IDS model to identify independent anomalous SNMP situations
A cooperatve connectonst IDS model to dentfy ndependent anomalous SNMP stuatons Álvaro Herrero, Emlo Corchado, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es Abstract
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationAn artificial Neural Network approach to monitor and diagnose multi-attribute quality control processes. S. T. A. Niaki*
Journal of Industral Engneerng Internatonal July 008, Vol. 4, No. 7, 04 Islamc Azad Unversty, South Tehran Branch An artfcal Neural Network approach to montor and dagnose multattrbute qualty control processes
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationAnalysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationImproved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationPolitecnico di Torino. Porto Institutional Repository
Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve
More informationApplication of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems
1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The
More informationA FEATURE SELECTION AGENT-BASED IDS
A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationA Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services
A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,
More informationEVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu
EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty klan@cse.ncku.edu.tw, ryan@cse.ncku.edu.tw ABSTRACT Voce over IP (VoIP) s one of
More informationHow To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationEfficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ
Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst
More informationAd-Hoc Games and Packet Forwardng Networks
On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang
More informationGender Classification for Real-Time Audience Analysis System
Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationA graph-theoretic framework for isolating botnets in a network
SECURITY AND COMMUNICATION NETWORKS Securty Comm. Networks (212) Publshed onlne n Wley Onlne Lbrary (wleyonlnelbrary.com)..5 SPECIAL ISSUE PAPER A graph-theoretc framework for solatng botnets n a network
More informationLogistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification
Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More informationWeb Spam Detection Using Machine Learning in Specific Domain Features
Journal of Informaton Assurance and Securty 3 (2008) 220-229 Web Spam Detecton Usng Machne Learnng n Specfc Doman Features Hassan Najadat 1, Ismal Hmed 2 Department of Computer Informaton Systems Faculty
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationOn the Interaction between Load Balancing and Speed Scaling
On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationLecture 2: Single Layer Perceptrons Kevin Swingler
Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More informationThe Load Balancing of Database Allocation in the Cloud
, March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton
More informationFORMAL ANALYSIS FOR REAL-TIME SCHEDULING
FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationConversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationOn File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network
On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg
More informationStatistical Methods to Develop Rating Models
Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationCausal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting
Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of
More informationVision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
More informationThe Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
More informationSurvey on Virtual Machine Placement Techniques in Cloud Computing Environment
Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center
More informationA Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks
A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationUse of Numerical Models as Data Proxies for Approximate Ad-Hoc Query Processing
Preprnt UCRL-JC-?????? Use of Numercal Models as Data Proxes for Approxmate Ad-Hoc Query Processng R. Kammura, G. Abdulla, C. Baldwn, T. Crtchlow, B. Lee, I. Lozares, R. Musck, and N. Tang U.S. Department
More informationNumber of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000
Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from
More informationRisk Model of Long-Term Production Scheduling in Open Pit Gold Mining
Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,
More informationSUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.
SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00
More informationThe Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.
Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance
More informationEfficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
More informationPlanning for Marketing Campaigns
Plannng for Marketng Campagns Qang Yang and Hong Cheng Department of Computer Scence Hong Kong Unversty of Scence and Technology Clearwater Bay, Kowloon, Hong Kong, Chna (qyang, csch)@cs.ust.hk Abstract
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationDetecting Credit Card Fraud using Periodic Features
Detectng Credt Card Fraud usng Perodc Features Alejandro Correa Bahnsen, Djamla Aouada, Aleksandar Stojanovc and Björn Ottersten Interdscplnary Centre for Securty, Relablty and Trust Unversty of Luxembourg,
More information1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
More informationv a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
More informationEstimating the Development Effort of Web Projects in Chile
Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty
More informationLoop Parallelization
- - Loop Parallelzaton C-52 Complaton steps: nested loops operatng on arrays, sequentell executon of teraton space DECLARE B[..,..+] FOR I :=.. FOR J :=.. I B[I,J] := B[I-,J]+B[I-,J-] ED FOR ED FOR analyze
More informationTitle Language Model for Information Retrieval
Ttle Language Model for Informaton Retreval Rong Jn Language Technologes Insttute School of Computer Scence Carnege Mellon Unversty Alex G. Hauptmann Computer Scence Department School of Computer Scence
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationM3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
More informationNetwork traffic analysis optimization for signature-based intrusion detection systems
Network traffc analyss optmzaton for sgnature-based ntruson detecton systems Dmtry S. Kazachkn, Student, Computatonal systems lab at CMC MSU, Denns Y. Gamayunov, scentfc advsor, PhD, Computatonal systems
More information