FaceTrust: Assessing the Credibility of Online Personas via Social Networks
|
|
- Octavia Haynes
- 8 years ago
- Views:
Transcription
1 FaceTrst: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos Kyngbaek Kim Xiaowei Yang Dke University University of California, Irvine Dke University 1. Introdction The sccess of the Internet has significantly changed how people interact with each other. Rich social interactions nowadays take place online. Users read, shop, chat, work, and play on the Internet. However, nlike many social interactions in the physical world, the Internet has largely hidden the identity attribtes of online sers. On the Internet, nobody knows yo are a dog, says the famos Peter Steiner cartoon. While anonymity has broght mch benefit, inclding protecting ser privacy and free speech, it also poses considerable secrity threats to online activities. What to believe and whom to believe on the Internet remains extremely challenging. Naive sers may easily become victims of online scams by individals that hide their real identity attribtes. There have been nmeros incidents where scammers defraded sers [1, 6] throgh or online social networks. Users with vested interest in a company have been caght creating fake positive reviews for the company s prodcts or services [5]. Both pedophiles and nderage sers may lie abot their ages to gain access to age-restricted websites or dring online interactions. This problem largely stems from the fact that there is crrently no lightweight and effective way to verify the identity attribtes (sch as age and location) of online personas. The typical approaches for establishing online identities involve offline manal verification of sers. For instance, a bank may reqire a ser to bring a government-issed ID before opening an online accont. Additionally, sers may prchase digital certificates that are verified and issed by trstworthy athorities sch as VeriSign. These approaches, albeit effective, are heavy-weight and often an overkill for many online interactions. Manal verification is slow and costly. It may easily become the bottleneck that prevents an online service from scaling to hndreds of millions of sers. In addition, strict ser athentication typically controls access to sensitive or critical resorces sch as bank acconts or internal networks, while many realistic Internet settings do not reqire strong athentication to gard critical resorces. Instead, they may benefit greatly from partial or likelyto-be-tre ser identity information. For example, it sffices for an age-restricted site to know whether a ser belongs to an age grop, not who the ser is or his exact age. Similarly, an online dating service ser may desire to know whether another ser s location or profession information is likely to be credible before initiating contact. These examples motivate the design of FaceTrst, a system that enables online personas to cost-effectively obtain credentials that verify the credibility of their identity statements to online services. In this paper, we refer to credibility as a measre of the likelihood that a ser s assertion is correct or tre. FaceTrst achieves this goal by mining and enriching information embedded in Online Social Networks (OSNs), and extends an OSN to provide lightweight, extensible, and relaxed digital credentials. We observe that OSNs already allow sers to express a limited form of trst relationships sing friend links. We propose to extend this ability by allowing sers to tag how credible they consider their friends assertions, sch as the identity information they post on their profiles. This process is similar to real-world backgrond check employed by government agencies bt is greatly atomated by sing online social networks. As an example, a ser that wishes to obtain an age certificate from his OSN provider may post on his profile that he is above 18. The ser wold reqest from his friends to tag his assertion as tre or false. The OSN provider wold analyze the annotated social graph to obtain the credibility of the ser s friends and sbseqently compte the credibility of the ser s assertion. It wold then isse to the ser a credential in the form of {assertion, credibility}. Online services cold se this OSN-issed relaxed credential to inform their interactions with the ser. We face several main challenges in realizing the above vision. First, how can the OSN reliably verify assertions made by sers ( 3.1, 3.2, 3.3)? Second, how can an OSN provider export the credibility information of assertions to verifiers withot violating a ser s privacy ( 3.4)? Lastly, how can we evalate the effectiveness of or design ( 4)? The main body of this paper describes or initial approaches towards addressing these challenges. We begin with a high-level overview of FaceTrst and several of its motivating examples. 1
2 TRUE x Figre 1: x x=1.0 TRUE y y y=1.0 FALSE z z z=0.5 FaceTrst overview and an age verification example. We se d and w to denote direct and tagger credibility, respectively. 2. FaceTrst Overview System Components: Figre 1 presents an overview of FaceTrst. The FaceTrst architectre consists of three main components: a) an OSN provider that maintains the social graph and its sers profiles; b) online sers that maintain acconts with the OSN and attempt to access online services by presenting OSN-issed credentials; and c) verifying online services that reglate access to their resorces or characterize ser inpts based on the ser s credentials. Assmptions and Threat Model: We assme that the OSN provider is flly trsted and can isse credentials to the best of its knowledge based on the inpt of its sers. We also assme that the OSN provider protects the privacy of its sers by not revealing their tagging information. Yet, some sers may choose not to reveal many of their identity attribtes to the OSN. We frther assme that verifying services may wish to track a ser against its will. They may collde in order to link ser acconts and derive a more accrate profile of a ser s activities. On the other hand, we assme that sers wish to remain anonymos and nlinkable to verifying services. We make the assmption that, typically, benign sers do not lie on behalf of others. Therefore, the collective information gathered from a ser s acqaintances is likely to correlate positively with the trth. Of corse, this assmption does not hold if a ser is motivated to lie abot his friends, e.g., when a grop of sers collde to misrepresent their identities or when a single ser creates mltiple fake OSN acconts (Sybil attack [12]) aiming at athenticating fake identity attribtes. We discss FaceTrst s defenses against the collder and Sybil attack in 3.3, and evalate the effectiveness of these defenses in 4. A Usage Example: Before describing FaceTrst in detail, we first se an age-verification example to shed light on how its components interact. As shown in Fig- re 1, User attempts to access an age-restricted movie at the Netflix website. At the same time, is concerned with his anonymity and does not wish to reveal neither his real identity nor a linkable psedonym to Netflix. With FaceTrst, Netflix may demand an OSN-issed age credential from the ser to allow access to its content. To obtain this credential, the ser mst have posted an age assertion on his OSN profile, and reqested his friends to tag the credibility of his age assertion before he attempts to access the age-restricted content. In this example, ser has assserted that his age is 21, and three of his friends, sers x, y, and z, have tagged the assertion with boolean vales T RUE, T RUE, and FALSE respectively. Since not all sers are eqally credible, the OSN provider has compted a credibility score (w) for each ser x, y, and z by analyzing the social graph and their tagging history as we soon describe in 3.3. The OSN provider comptes an overall credibility score for ser s age assertion (0.6 in this example) by aggregating s friends tagged vales weighted by their credibility scores ( 3.2). As shown in Figre 1, the OSN isses an age credential with an overall credibility that certifies that the ser belongs to the restricted age grop, and the ser presents this credential to a Netflix software process to gain access to Netflix content. FaceTrst implements identity attribte credentials sing idemix [9], an anonymos, nlinkable and non-transferable credential system to preserve ser privacy. More Motivating Examples: In addition to age verification, we envision that FaceTrst credentials may benefit Internet sers and online services in many other ways. A few more examples inclde bt are not limited to: Assessing the athority or relevance of online reviews or ratings with profession credentials. Many Internet sers read online reviews before making prchase decisions. Intitively, expert opinions of an online prodct may appear more athoritative to others. For instance, a review on a networking textbook from a compter science professor may carry more weight than that from an average ser. With FaceTrst, if an expert ser desires to appear more athoritative, he may reqest a profession credential from his OSN provider and present this credential to an online review site when sbmitting his reviews. Verifying participant eligibility. A citizen jornalism site [4] may wish to verify that a ser actally resides in a specified area before it accepts its report on an event that took place in that area. Similar defenses can be employed by online fora, online action sites, and in general by any online service that wishes to restrict participants to certain grops of people sch as women grops, residents in a certain geographic area, or people of cer- 2
3 tain age grops. FaceTrst can assist legitimate participants to obtain credentials that certify their eligibility. Preventing online frads. Scammers commonly respond to online postings alleging to be prospective participants in legitimate transactions (e.g., a potential tenant of an apartment) bt in reality aiming to commit advancefee frad [2]. Sch attacks cold possibly be averted if scammers were nable to lie abot their location, affiliation, or age. To this end, a classifieds service sch as Craigslist cold employ FaceTrst to verify identity attribtes of sers that post or respond to ads. The classifieds service can then attach to each ad post or reply the corresponding verified assertions, enabling sers to make more informed decisions. 3. FaceTrst Design We now describe or design in more detail. A key challenge of the design is to accrately assess the credibility of ser assertions, as malicios sers may attempt to lie or collde to obtain credentials to their favor. As an initial step, we have developed a social graph analysis algorithm by leveraging prior work on attack-resistant trst metrics [17]. Or preliminary evalation in 4 sggests that this initial design is promising in mitigating varios attacks. 3.1 Social Tagging FaceTrst ses social tagging to obtain the credibility of online personas. By social tagging, we refer to OSN sers posting identity assertions on their profile and their friends assigning a binary direct credibility vale TRUE or FALSE to them. FaceTrst categorizes ser assertions into varios types sch as age, address, profession, expertise etc. A ser posts his assertions of assorted types in his OSN profile. For instance, for the type age, an assertion has the format [{<,=,>}, nmber], e.g., [> 18] means that the ser claims to be older than 18. For the type location, the assertion has the format [{contry, state, city...}, string]. For each assertion A t j of type t posted by a ser j, j s friend i may tag a direct credibility score di A j. da i j takes two vales: a) TRUE, indicating that i believes j s assertion; and b) FALSE, vice versa. TRUE is mapped to the integer vale 1, and FALSE to -1 in the crrent design. A posted assertion and the associated tags are valid for a specified period of time, which is set by the OSN provider depending on the assertion type. An assertion is niqely identified by its {type, assertion} pair, ths a ser cannot repost the same assertion and reset nfavorable tags before it expires. We note that this design assmes that sers are willing to tag their friends. There is abndant evidence that sggests social tagging may be adopted by sers. For example, the How well do yo know me? Facebook application (qiz) enables sers to answer qestions that their friends post abot themselves and has amassed 1.2 million monthly active sers. It is or ftre work to condct a sability stdy to validate the adoptability of social tagging. In addition, or evalation ( 4) on the effectiveness of the trst metric we employ is sensitive to the freqency with which sers tag each other, and we present reslts for varying degrees of tagging adoptability. To frther motivate tagging among sers we employ a rdimentary incentive mechanism nder which sers reciprocate tags to each other in a tit-for-tat fashion. Users that wish to be able to athenticate to online services need their friends to tag them. The tit-for-tat scheme dictates that a ser that wishes to be tagged by a friend has to tag his friend in retrn. In particlar, when a ser i posts an assertion and wishes to be issed credentials for it, i may explicitly reqest from a friend f to tag the assertion. f may choose to demand that i tags one of his assertions in retrn. If i does not reciprocate his friend f s tagging, the system does not consider f s tag on i in compting the credibility of i s assertion. The direct credibility tags are stored by the OSN provider and are known only to the OSN and the taggers. They are never made available to other sers, as they represent sensitive information. 3.2 Assertion Credibility In the FaceTrst design, an OSN provider plays the role of an athority that isses inexpensive and relaxed credentials. By relaxed, we mean that nlike a conventional certificate athority, the OSN does not garantee that an assertion is absoltely correct. Instead, each credential is associated with an assertion credibility measre in [0,1] that reflects the probability of the assertion being tre as estimated by the OSN. This metric resembles a wisdom of crowds approach. Let F j denote the set of friends a ser j has. To compte an assertion credibility score a A on an assertion A t j of type t and posted by ser j, the OSN provider aggregates the direct credibility tags by j s friends as follows: a A = max( w t i da i j / w t i, 0) (1) i F j i F j Tags are weighted by weight w t i becase sers are not eqally credible, e.g., a teenager s tag on another ser s age assertion shold carry less weight than those from more trstworthy sers. We employ the additional condition that if the sm of the weights of j s friends is below a specified threshold, a A is 0. We discss how we obtain these weights in the next section. 3.3 Tagger Credibility How can FaceTrst reliably determine the weights w t i? We refer to wt i [0, 1] as tagger credibility for 3
4 the assertion type t. We observe that the problem is similar to determining the trstworthiness of a ser i and ths resorting to trst metric comptation. Trst metric comptation refers to the set of mechanisms that compte the trstworthiness of a node in a trst graph. There are two types of trst metrics: global, where the trstworthiness of a node is the same to all other nodes; and pairwise, where a node s trstworthiness is relative to another node. Since FaceTrst isses credentials on grond trth facts, sch as age and profession, and not on perceptions that are relative to the qerier, sch as recommendations or taste, we consider global trst metrics, e.g. [8, 16, 17, 24] more appropriate than pairwise and sbjective ones, e.g. [7, 14, 19]. We face two challenges in incorporating trst metric comptation to determine the weights w t i. The first is defining how the edges in the trst graph are formed. A trst metric is compted sing a trst graph, where an edge between two nodes i and j is explicitly labeled with the degree of trst that i places on j. However, this explicit trst information is not available in a social network graph. One design choice is to reqire sers to explicitly tag other their friends with a trst estimate. However, nlike grond trths sch as a friend s age grop or profession, we consider it difficlt for a ser to gage the abstract trstworthiness of a friend. Instead, FaceTrst atomatically extracts trst by compting the similarity between the tags of two friends sing a formla that resembles the Jaccard [15] index as follows. Let N be the total nmber of tags by friends i and j that involve assertions of type t tagged by both i and j. Let C be the nmber of tags on common assertions for which i and j are in agreement. The tagging similarity between i and j for type t is eqal to C/N. If N = 0, the similarity is eqal to 0. After this comptation, we translate a social graph with tagging history into a trst graph where each edge between two friends i and j is labeled with an explicit tagging similarity. We refer to this transformed graph as the tagging similarity graph. The second isse is to compte the tagging credibility w t i of each ser i from the tagging similarity graph. To this end, we adopt Levien s Advogato trst metric [17], a graph analysis algorithm based on maximm flow. We choose this max-flow-based trst metric becase it has been shown to be resistant to varios attacks [18,21,25]. Next, we briefly smmarize how we compte tagger credibility w t i sing the Advogato algorithm. We apply the Advogato trst metric on the tagging similarity graph by treating the tagging similarity as the level of trst between two nodes. The Advogato algorithm determines the set of nodes that can be trsted at a certain trst level x, i.e., whose tagger credibility w t i is no less than x. In the first step, the algorithm picks a highly trsted ser, e.g., a trsted employee of the OSN provider that is also brdened with verifying and tagging assertions of many of his acqaintances. This ser acts as the sorce node in the max-flow comptation. Next, the algorithm prnes all edges with tagging similarity less than x. Sbseqently, the tagger credibility of sers in the social graph is compted as follows. An integer capacity is assigned to each node as a fnction of the ser s shortest path distance from the sorce. Users at the same distance from the sorce are said to be at the same level. To obtain the taggers that have at least x credibility, the capacity of the sorce node is set approximately to the expected nmber of sers that are at least x credible. The sm of the capacity of sers at each sbseqent level from the sorce shold be approximately eqal to the capacity of the sorce. Ths, as we move away from the sorce and the network fans ot, the capacity of the sers at each sbseqent level diminishes. The tagging similarity graph is then transformed into a new graph with additional edges from the sers to an additional artificial spersink ser. In the new graph, capacities are assigned to edges instead of sers. A ser i with capacity c i is split into two nodes i and i + and one edge of capacity c i 1 is added from i to i +. The incoming and otcoming edges of i become incoming edges and otcoming edges of i and i +, respectively. In addition, one edge of capacity 1 is added between i and the spersink. We compte the maximm flow from the sorce to the spersink sing the Ford-Flkerson algorithm in O(E c sorce ) time, where c sorce is the capacity of the sorce. For a graph in which trst edges correspond to tagging similarity greater than or eqal to x and for assertion type t, if the edge i i + has flow greater than 0, i is accepted as being a ser that is at least x credible with respect to assertions of type t. We rn this algorithm mltiple times for edges that correspond to tagger credibility at increasing vales: x {0.5,0.6,...1}. For each ser i we assign tagger credibility w t i (Eqation 1) eqal to the highest credibility x among the trst graphs in which i was accepted. If i is not accepted for any tagger credibility x, w t i = 0. Based on the analysis by Levien [17], the nmber of Sybils or otherwise malicios sers that can be accepted as being at least x credible is bond by Σ i S (c i 1), where S is the set of honest sers that have greater than or eqal to x tagging similarity with dishonest sers. Under the assmption that it is more difficlt for malicios sers to have high tagging similarity with high capacity nodes closer to the sorce than it is with lower capacity nodes frther from the sorce, the nmber of accepted malicios sers shold be low. 3.4 OSN-Issed Credentials After the OSN provider obtains the assertion credibil- 4
5 ity score for a ser j s assertion A t j, it can isse a credential for this assertion. As shown in Figre 1, a credential issed by an OSN will inclde the assertion type t, the assertion A t j, and the assertion credibility score. A credential mst be athenticated by cryptographic primitives sch as an OSN s pblic key signatre. In the FaceTrst design, we se the idemix [9] anonymos nlinkable credential system becase sers may desire to preserve their anonymity and ntraceability of online activities. The idemix system is based on an efficient non-transferable anonymos and nlinkable credential scheme introdced by Camenisch et al. [10]. An idemix credential does not reveal any identifying information of a ser that possesses the credential, which is ideal for online verifications sch as age checking. It also prevents one ser from transferring his credentials to other sers. More details on how we integrate idemix with FaceTrst can be fond in [22]. 4. Evalation To gain a better nderstanding on how or initial design works, we wold like to evalate all of the following aspects of FaceTrst: Effectiveness: How well do credibility scores correlate with the trth, and how well does the design withstand incorrect ser tagging and collder or Sybil attacks? Comptational feasibility: A social network may consist of several hndreds of millions of sers. Will an OSN provider have sfficient comptational resorces to mine the social graph and derive credibility measres? Usability: How often and how accrately will a ser tag his friends to help them obtain credentials? It will take a fll system implementation and experimentation on a real-world OSN to answer these qestions. The qestion regarding effectiveness is particlar difficlt, becase trst is inherently sbjective, and it might not even be feasible to obtain the grond trth. As a first step, we describe or preliminary approaches to evalate the effectiveness of the design. We defer the comptational feasibility and the sability stdy for ftre experimentations on compter clsters and with a Facebook application, respectively. The goal of or evalation is to demonstrate that trthfl assertions get high credibility, while dishonest assertions get low credibility even in the presence of Sybil attacks. To this end, we evalate the effectiveness of the Advogato-based trst metric and Eqation 1 sed by FaceTrst sing a 200K sample of a crawled Facebook social graph, obtained from a previos stdy [13]. The average nmber of friends of each ser in the graph is abot 12 and the maximm nmber of friends is 313. Credibility Honest(No Sybils) Dishonest(No Sybils) Dishonest(200 Sybils) % honest sers (a) Credibility Honest(No Sybils) Dishonest(No Sybils) Dishonest(200 Sybils) tags per ser (N) Figre 2: a) Credibility of tre and false assertions as a fnction of the fraction of honest nodes when the maximm nmber of friends N a ser tags is eqal to 20; b) Credibility of tre and false assertions as a fnction of N when 80% of sers are honest. In or simlation, each ser in the social graph posts a single assertion of the same type on his profile. We have two types of sers: honest and dishonest. Honest sers always post trthfl assertions and dishonest sers always post false assertions. Both honest and dishonest sers are randomly distribted in the social graph. In addition, each ser tags the assertions of at most N of his friends. We vary N to reflect varios degrees of adoptability of social tagging. The honest sers tag their friends trthflly, that is, they tag as tre the assertions made by their honest friends and as false the assertions made by their dishonest friends. The remaining dishonest sers tag all assertions as tre, regardless of whether the sers that post them are honest or not. In this way, dishonest sers collde to increase the credibility of each other s assertions. By trthflly tagging assertions of honest sers, dishonest sers attempt to increase their tagging similarity with trstworthy sers. To evalate the scheme s resilience to Sybil attacks, several dishonest sers each create 200 Sybil nodes, which are only connected to their creators. Sybils tag the assertions of their creator as tre in order to increase the credibility of his dishonest assertions. The creator arranges to have 1.0 tagging similarity with all its Sybils. Since we assme that the sers near the sorce are more reliable, only all the dishonest sers whose distance from the sorce is more than five hops create Sybils. We obtain the tagger credibility according to 3.3. We set the capacity of the sorce c sorce eqal to 80% of the nmber of sers in the graph. We randomly sample 3000 honest and 3000 dishonest assertions and compte the average credibility of each. Figre 2 plots the credibility of honest and dishonest assertions for the case in which dishonest sers do not employ Sybils and the case in which they do. The credibility of honest assertions with Sybils is not inclded becase it is almost eqal to their credibility withot Sybils. In Figre 2(a), we vary the fraction of sers that are honest from 50% to 95% in order to assess the trst metric s resilience to attacks. The fraction of honest (b) 5
6 sers is compted exclding the Sybil sers. Each ser tags at most 20 of its friends. We observe that the average credibility of honest assertions is approximately 0.9, regardless of the fraction of honest nodes. On the other hand, the credibility of dishonest assertions is very small, i.e., 0.2 even when 50% of sers are dishonest and Sybils are deployed. When dishonest sers do not employ Sybils and the fraction of dishonest sers is 5%, their opportnities for collding by tagging each other are sbstantially redced, ths the credibility of their assertions drops to almost 0. Figre 2(b) shows the credibility of honest and dishonest assertions as a fnction of the maximm nmber of friends N that each ser tags, for the fraction of honest nodes eqal to 80%. As N increases, sers obtain more accrate tagging similarity with their friends, increasing the credibility of tre assertions and decreasing the credibility of false ones (for N > 6). When tagging is infreqent, i.e., N < 6, a large portion of edges between honest sers do not have high tagging similarity, as it becomes less likely for honest sers to tag the same assertions. This lack of tagging information reslts in honest assertions getting relatively low credibility. In order to achieve reasonable assertion credibility vales, N shold be greater than Related Work The goal of FaceTrst is mostly related to the PGP Web of Trst [3, 24, 27]. Like PGP, FaceTrst aims to circmvent the expensive and often monopolized Certificate Athorities sch as VeriSign to provide lightweight credentials. Unlike PGP, FaceTrst ses the intitive OSN interface, and employs social tagging rather than key signing to obtain trst metrics. Frthermore, FaceTrst is easily extensible, and is not limited to certifying only pblic keys. Users can tag each other regarding mltiple types of identity attribtes, and this set can be extended by adding fields into a ser s profile. FaceTrst adapts a trst metric proposed in previos work [17]. However, or contribtion is not the trst metric per se. Instead, or contribtions lie in the novelty of sing OSNs to provide lightweight, extensible, and relaxed credentials, and the overall design and preliminary evalation of FaceTrst. Several systems have employed trst in social networks to improve system secrity [11, 20, 23, 25, 26]. To the best of or knowledge, this is the first work that proposes to se OSNs to provide relaxed credentials for online personas. We provide a more extensive comparison with related work in [22]. 6. Conclsion Despite the large volme of social interactions taking place on the Internet, it is still hard to assess the credibility of statements made by online sers. This paper presents FaceTrst, a system that leverages online social networks to provide lightweight, flexible, and relaxed credentials that enable sers to assess the credibility of others and their assertions. In the FaceTrst design, OSN sers explicitly tag as tre or false their friends identity assertions made available in their social network profiles. An OSN provider analyzes the social graph and the tags to assess the credibility of a ser s assertions, and isse credentials annotated by credibility scores. Or preliminary evalation sggests that FaceTrst is effective in obtaining credible and otherwise navailable identity information for online personas. 7. References [1] Craigslist scams. [2] Nigerian Advance Fee Frad. [3] Thawte web of trst. [4] Unedited. Unfiltered. News. ireport.com. [5] Belkin s Amazon Rep Paying For Fake Online Reviews. hardware.slashdot.org/article.pl?sid=09%2f01%2f17% 2F166226&from=rss, [6] Teen Accsed of Sex assalts in Facebook Scam [7] R. Andersen, C. Borgs, J. Chayes, U. Feige, A. Flaxman, A. Kalai, V. Mirrokni, and M. Tennenholtz. Trst-based Recommendation Systems: An Axiomatic Approach. In WWW, [8] S. Brin and L. Page. The Anatomy of a Large-scale Hypertextal Web Search Engine. In Compter Networks and ISDN Systems, [9] J. Camenisch and E. V. Herreweghen. Design and Implementation of the idemix Anonymos Credential System. In ACM CCS, [10] J. Camenisch and A. Lysyanskay. An Efficient System for Non-transferable Anonymos Credentials with Optional Anonymity Revocation. In EUROCRYPT, [11] G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes sing Social Networks. In NDSS, [12] J. R. Docer. The Sybil Attack. In IPTPS, March [13] M. Gjoka, M. Sirivianos, A. Markopolo, and X. Yang. Poking Facebook: Characterization of OSN Applications. In WOSN, [14] R. Gha, R. Kmar, P. Raghavan, and A. Tomkins. Propagation of Trst and Distrst. In WWW, [15] P. Jaccard. Etde Comparative de la Distribtion Florale dans ne Portion des Alpes et des Jra. In Blletin del la Socit Vadoise des Sciences Natrelles 37, , [16] S. D. Kamvar, M. Schlosser, and H. Garcia-Molina. The EigenTrst Algorithm for Reptation Management in P2P Networks. In WWW, [17] R. Levien. Attack-resistant Trst Metrics [18] R. Levien and A. Aiken. Attack-resistant trst metrics for pblic key certification. In Usenix Secrity, [19] P. Massa and P. Avesani. Controversial Users Demand Local Trst Metrics: An Experimental Stdy on epinions. com Commnity. In AAAI, [20] A. Mislove, A. Post, P. Drschel, and K. P. Gmmadi. Ostra: Leveraging Social Networks to Thwart Unwanted Traffic. In NSDI, [21] M. Reiter and S. Stbblebine. Athentication Metric Analysis and Design. In ACM TISSEC, [22] M. Sirivianos, X. Yang, and K. Kim. FaceTrst: Assessing the Credibility of Online Personas via Social Networks. ~msirivia/pblications/facetrst-tech-report.pdf, [23] Y. Sovran, A. Libonati, and J. L. Pass it on: Social Networks Stymie Censors. In IPTPS, [24] W. Stallings. Protect Yor Privacy: A Gide for PGP Users. In Prentice-Hall, [25] D. N. Tran, B. Min, J. Li, and L. Sbramanian. Sybil-Resilient Online Content Rating. In NSDI, [26] H. Y, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao. DSybil: Optimal Sybil-Resistance for Recommendation Systems. In IEEE S&P, [27] P. Zimmmerman. The Official PGP Users Gide. In MIT Press,
FaceTrust: Assessing the Credibility of Online Personas via Social Networks
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos Xiaowei Yang Kyungbaek Kim Duke University Duke University University of California, Irvine msirivia@cs.duke.edu
More informationEnabling Advanced Windows Server 2003 Active Directory Features
C H A P T E R 5 Enabling Advanced Windows Server 2003 Active Directory Featres The Microsoft Windows Server 2003 Active Directory directory service enables yo to introdce advanced featres into yor environment
More informationDeploying Network Load Balancing
C H A P T E R 9 Deploying Network Load Balancing After completing the design for the applications and services in yor Network Load Balancing clster, yo are ready to deploy the clster rnning the Microsoft
More informationDesigning an Authentication Strategy
C H A P T E R 1 4 Designing an Athentication Strategy Most organizations need to spport seamless access to the network for mltiple types of sers, sch as workers in offices, employees who are traveling,
More informationDesigning and Deploying File Servers
C H A P T E R 2 Designing and Deploying File Servers File servers rnning the Microsoft Windows Server 2003 operating system are ideal for providing access to files for sers in medim and large organizations.
More informationUsing GPU to Compute Options and Derivatives
Introdction Algorithmic Trading has created an increasing demand for high performance compting soltions within financial organizations. The actors of portfolio management and ris assessment have the obligation
More informationThe Intelligent Choice for Basic Disability Income Protection
The Intelligent Choice for Basic Disability Income Protection provider Pls Limited Keeping Income strong We prposeflly engineer or basic disability income prodct to provide benefit-rich featres delivering
More informationIntroduction to HBase Schema Design
Introdction to HBase Schema Design Amandeep Khrana Amandeep Khrana is a Soltions Architect at Clodera and works on bilding soltions sing the Hadoop stack. He is also a co-athor of HBase in Action. Prior
More informationPlanning a Smart Card Deployment
C H A P T E R 1 7 Planning a Smart Card Deployment Smart card spport in Microsoft Windows Server 2003 enables yo to enhance the secrity of many critical fnctions, inclding client athentication, interactive
More informationPlanning an Active Directory Deployment Project
C H A P T E R 1 Planning an Active Directory Deployment Project When yo deploy the Microsoft Windows Server 2003 Active Directory directory service in yor environment, yo can take advantage of the centralized,
More informationPurposefully Engineered High-Performing Income Protection
The Intelligent Choice for Disability Income Insrance Prposeflly Engineered High-Performing Income Protection Keeping Income strong We engineer or disability income prodcts with featres that deliver benefits
More informationThe Intelligent Choice for Disability Income Protection
The Intelligent Choice for Disability Income Protection provider Pls Keeping Income strong We prposeflly engineer or disability income prodct with featres that deliver benefits sooner and contine paying
More informationPlanning and Implementing An Optimized Private Cloud
W H I T E PA P E R Intelligent HPC Management Planning and Implementing An Optimized Private Clod Creating a Clod Environment That Maximizes Yor ROI Planning and Implementing An Optimized Private Clod
More informationSocial Work Bursary: Academic year 2015/16 Application notes for students on undergraduate courses
Social Work Brsary: Academic year 2015/16 Application notes for stdents on ndergradate corses These notes are for ndergradate stdents who have previosly received a brsary. Please make sre yo complete the
More informationGUIDELINE. Guideline for the Selection of Engineering Services
GUIDELINE Gideline for the Selection of Engineering Services 1998 Mission Statement: To govern the engineering profession while enhancing engineering practice and enhancing engineering cltre Pblished by
More informationTrustSVD: Collaborative Filtering with Both the Explicit and Implicit Influence of User Trust and of Item Ratings
TrstSVD: Collaborative Filtering with Both the Explicit and Implicit Inflence of User Trst and of Item Ratings Gibing Go Jie Zhang Neil Yorke-Smith School of Compter Engineering Nanyang Technological University
More informationCloser Look at ACOs. Designing Consumer-Friendly Beneficiary Assignment and Notification Processes for Accountable Care Organizations
Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Janary 2012
More informationBorrowing for College. Table of contents. A guide to federal loans for higher education
Borrowing for College A gide to federal loans for higher edcation Table of contents Edcation loan basics 2 Applying for edcation loans 3 Repaying edcation loans 3 Controlling edcation loan debt 5 Glossary
More informationMake the College Connection
Make the College Connection A college planning gide for stdents and their parents Table of contents The compelling case for college 2 Selecting a college 3 Paying for college 5 Tips for meeting college
More informationOptimal Trust Network Analysis with Subjective Logic
The Second International Conference on Emerging Secrity Information, Systems and Technologies Optimal Trst Network Analysis with Sbjective Logic Adn Jøsang UNIK Gradate Center, University of Oslo Norway
More informationMotorola Reinvents its Supplier Negotiation Process Using Emptoris and Saves $600 Million. An Emptoris Case Study. Emptoris, Inc. www.emptoris.
Motorola Reinvents its Spplier Negotiation Process Using Emptoris and Saves $600 Million An Emptoris Case Stdy Emptoris, Inc. www.emptoris.com VIII-03/3/05 Exective Smmary With the disastros telecommnication
More informationAnatomy of SIP Attacks
Anatomy of SIP Attacks João M. Ceron, Klas Steding-Jessen, and Cristine Hoepers João Marcelo Ceron is a Secrity Analyst at CERT.br/NIC.br. He holds a master s degree from Federal University of Rio Grande
More informationA Novel QR Code and mobile phone based Authentication protocol via Bluetooth Sha Liu *1, Shuhua Zhu 2
International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) A Novel QR Code and mobile phone based Athentication protocol via Bletooth Sha Li *1, Shha Zh 2 *1
More informationAn unbiased crawling strategy for directed social networks
Abstract An nbiased crawling strategy for directed social networks Xeha Yang 1,2, HongbinLi 2* 1 School of Software, Shenyang Normal University, Shenyang 110034, Liaoning, China 2 Shenyang Institte of
More informationDirect Loan Basics & Entrance Counseling Guide. For Graduate and Professional Student Direct PLUS Loan Borrowers
Direct Loan Basics & Entrance Conseling Gide For Gradate and Professional Stdent Direct PLUS Loan Borrowers DIRECT LOAN BASICS & ENTRANCE COUNSELING GUIDE For Gradate and Professional Stdent Direct PLUS
More informationCloser Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know
Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Updated
More informationPlanning a Managed Environment
C H A P T E R 1 Planning a Managed Environment Many organizations are moving towards a highly managed compting environment based on a configration management infrastrctre that is designed to redce the
More informationEMC ViPR. Concepts Guide. Version 1.1.0 302-000-482 02
EMC ViPR Version 1.1.0 Concepts Gide 302-000-482 02 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is
More informationEMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03
EMC VNX Series Version VNX1, VNX2 EMC Secre Remote Spport for VNX 300-014-340 REV 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Jly, 2014 EMC believes the information
More informationHigh Availability for Internet Information Server Using Double-Take 4.x
High Availability for Internet Information Server Using Doble-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks
More informationDIRECT TAX LAWS Taxability of Capital Gains on By-back of Shares - Debate ignites after AAR s rling in RST s case BACKGROUND 1. Recently, the Athority for Advance Rlings ( AAR ) in the case of RST, In
More informationThe Boutique Premium. Do Boutique Investment Managers Create Value? AMG White Paper June 2015 1
The Botiqe Premim Do Botiqe Investment Managers Create Vale? AMG White Paper Jne 2015 1 Exective Smmary Botiqe active investment managers have otperformed both non-botiqe peers and indices over the last
More informationCorporate performance: What do investors want to know? Innovate your way to clearer financial reporting
www.pwc.com Corporate performance: What do investors want to know? Innovate yor way to clearer financial reporting October 2014 PwC I Innovate yor way to clearer financial reporting t 1 Contents Introdction
More information10 Evaluating the Help Desk
10 Evalating the Help Desk The tre measre of any society is not what it knows bt what it does with what it knows. Warren Bennis Key Findings Help desk metrics having to do with demand and with problem
More informationPosition paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists.
Position paper smart city economics a mlti-sided approach to financing the smart city Yor bsiness technologists. Powering progress From idea to reality The hman race is becoming increasingly rbanised so
More informationSocial Work Bursary: Academic Year 2014/15 Application notes for students on postgraduate courses
Social Work Brsary: Academic Year 2014/15 Application notes for stdents on postgradate corses These notes are for stdents who do not have a partner or any dependants. Please make sre yo complete the correct
More informationPgrading To Windows XP 4.0 Domain Controllers and Services
C H A P T E R 8 Upgrading Windows NT 4.0 Domains to Windows Server 2003 Active Directory Upgrading yor domains from Microsoft Windows NT 4.0 to Windows Server 2003 Active Directory directory service enables
More informationIntroducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7
Introdcing Revene Cycle Optimization! STI Provides More Options Than Any Other Software Vendor ChartMaker Clinical 3.7 2011 Amblatory EHR + Cardiovasclar Medicine + Child Health STI Provides More Choices
More information11 Success of the Help Desk: Assessing Outcomes
11 Sccess of the Help Desk: Assessing Otcomes I dread sccess... I like a state of continal becoming, with a goal in front and not behind. George Bernard Shaw Key Findings Respondents help desks tend to
More information9 Setting a Course: Goals for the Help Desk
IT Help Desk in Higher Edcation ECAR Research Stdy 8, 2007 9 Setting a Corse: Goals for the Help Desk First say to yorself what yo wold be; and then do what yo have to do. Epictets Key Findings Majorities
More information7 Help Desk Tools. Key Findings. The Automated Help Desk
7 Help Desk Tools Or Age of Anxiety is, in great part, the reslt of trying to do today s jobs with yesterday s tools. Marshall McLhan Key Findings Help desk atomation featres are common and are sally part
More informationA guide to safety recalls in the used vehicle industry GUIDE
A gide to safety recalls in the sed vehicle indstry GUIDE Definitions Aftermarket parts means any prodct manfactred to be fitted to a vehicle after it has left the vehicle manfactrer s prodction line.
More informationCloser Look at ACOs. Putting the Accountability in Accountable Care Organizations: Payment and Quality Measurements. Introduction
Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Janary 2012
More informationHSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement
HSBC Internet Banking Combined Prodct Disclosre Statement and Spplementary Prodct Disclosre Statement AN IMPORTANT MESSAGE FOR HSBC CUSTOMERS NOTICE OF CHANGE For HSBC Internet Banking Combined Prodct
More informationFINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet
FINANCIAL FITNESS Fact Sheet Janary 1998 FL/FF-02 SELECTING A CREDIT CARD Liz Gorham, Ph.D., AFC Assistant Professor and Family Resorce Management Specialist, Utah State University Marsha A. Goetting,
More informationWHITE PAPER. Filter Bandwidth Definition of the WaveShaper S-series Programmable Optical Processor
WHITE PAPER Filter andwidth Definition of the WaveShaper S-series 1 Introdction The WaveShaper family of s allow creation of ser-cstomized filter profiles over the C- or L- band, providing a flexible tool
More informationKentucky Deferred Compensation (KDC) Program Summary
Kentcky Deferred Compensation (KDC) Program Smmary Smmary and Highlights of the Kentcky Deferred Compensation (KDC) Program Simple. Smart. For yo. For life. 457 Plan 401(k) Plan Roth 401(k) Deemed Roth
More informationCRM Customer Relationship Management. Customer Relationship Management
CRM Cstomer Relationship Management Farley Beaton Virginia Department of Taxation Discssion Areas TAX/AMS Partnership Project Backgrond Cstomer Relationship Management Secre Messaging Lessons Learned 2
More informationHerzfeld s Outlook: Seasonal Factors Provide Opportunities in Closed-End Funds
VIRTUS HERZFELD FUND Herzfeld s Otlook: Seasonal Factors Provide Opportnities in Closed-End Fnds When it comes to investing in closed-end fnds, a comprehensive nderstanding of the inefficiencies of the
More informationUSA Funds Life Skills Course Summaries. Financial Aid and Paying for College. 101 How Will I Pay for My Higher Education?
USA Fnds Life Skills Corse Smmaries Financial Aid and Paying for College 101 How Will I Pay for My Higher Edcation? Teaches stdents how to find resorces and fnds to finance their higher edcation by examining
More informationForm M-1 Report for Multiple Employer Welfare Arrangements (MEWAs) and Certain Entities Claiming Exception (ECEs)
U.S. Department of Labor Employee Benefits Secrity Administration Room N5511 200 Constittion Avene, NW Washington, DC 20210 P-450 Form M-1 Report for Mltiple Employer Welfare Arrangements (MEWAs) and Certain
More informationaééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë
C H A P T E R 7 aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë Deploying Microsoft Windows Server 2003 s involves creating new geographically based child domains nder the forest root domain. Deploying
More informationOptimal Personalized Filtering Against Spear-Phishing Attacks
Optimal Personalized Filtering Against Spear-Phishing Attacks Aron Laszka and Yevgeniy Vorobeychik and Xenofon Kotsokos Institte for Software Integrated Systems Department of Electrical Engineering and
More informationThe Role of the Community Occupational Therapist
Ceredigion Conty Concil Social Services Department The Role of the Commnity Occpational Therapist...taking care to make a difference Large Print or other format/medim are available on reqest please telephone
More informationSpectrum Balancing for DSL with Restrictions on Maximum Transmit PSD
Spectrm Balancing for DSL with Restrictions on Maximm Transmit PSD Driton Statovci, Tomas Nordström, and Rickard Nilsson Telecommnications Research Center Vienna (ftw.), Dona-City-Straße 1, A-1220 Vienna,
More informationThe Time is Now for Stronger EHR Interoperability and Usage in Healthcare
The Time is Now for Stronger EHR Interoperability and Usage in Healthcare Sponsored by Table of Contents 03 Stdy: Large Nmber of EHRs Do Not Meet Usability Standards 05 Black Book: EHR Satisfaction Growing
More informationOpening the Door to Your New Home
Opening the Door to Yor New Home A Gide to Bying and Financing. Contents Navigating Yor Way to Home Ownership...1 Getting Started...3 Finding Yor Home...9 Finalizing Yor Financing...12 Final Closing...13
More informationRoth 401(k) and Roth 403(b) Accounts: Pay Me Now or Pay Me Later Why a Roth Election Should Be Part of Your Plan Now
Reprinted with permission from the Society of FSP. Reprodction prohibited withot pblisher's written permission. Roth 401(k) and Roth 403(b) Acconts: Why a Roth Election Shold Be Part of Yor Plan Now by
More informationIsilon OneFS. Version 7.1. Backup and recovery guide
Isilon OneFS Version 7.1 Backp and recovery gide Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished March, 2014 EMC believes the information in this pblication is accrate
More informationHigh Availability for Microsoft SQL Server Using Double-Take 4.x
High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network
More informationEvery manufacturer is confronted with the problem
HOW MANY PARTS TO MAKE AT ONCE FORD W. HARRIS Prodction Engineer Reprinted from Factory, The Magazine of Management, Volme 10, Nmber 2, Febrary 1913, pp. 135-136, 152 Interest on capital tied p in wages,
More informationASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks
ASAND: Asynchronos Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Bsch, Malik Magdon-Ismail, Bülent Yener Compter Science Department, Rensselaer Polytechnic
More informationCurriculum development
DES MOINES AREA COMMUNITY COLLEGE Crriclm development Competency-Based Edcation www.dmacc.ed Why does DMACC se competency-based edcation? DMACC tilizes competency-based edcation for a nmber of reasons.
More informationFacilities. Car Parking and Permit Allocation Policy
Facilities Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Contents Page 1 Introdction....................................................2 2.0 Application
More informationDesigning a TCP/IP Network
C H A P T E R 1 Designing a TCP/IP Network The TCP/IP protocol site defines indstry standard networking protocols for data networks, inclding the Internet. Determining the best design and implementation
More informationUpgrading Windows 2000 Domains to Windows Server 2003 Domains
C H A P T E R 9 Upgrading Windows 2000 Domains to Windows Server 2003 Domains Upgrading yor network operating system from Microsoft Windows 2000 to Windows Server 2003 reqires minimal network configration
More information2014-2015 SUGGESTED LENDER LIST FOR PRIVATE LOAN OPTIONS AVAILABLE TO INTERNATIONAL GRADUATE STUDENTS
The chart below otlines the lender contact information and the lender description of the fee strctre, interest rates, and borrower benefits associated with each lender s private loan prodct for loans disbrsed
More informationSample Pages. Edgar Dietrich, Alfred Schulze. Measurement Process Qualification
Sample Pages Edgar Dietrich, Alfred Schlze Measrement Process Qalification Gage Acceptance and Measrement Uncertainty According to Crrent Standards ISBN: 978-3-446-4407-4 For frther information and order
More informationEMC ViPR Analytics Pack for VMware vcenter Operations Management Suite
EMC ViPR Analytics Pack for VMware vcenter Operations Management Site Version 1.1.0 Installation and Configration Gide 302-000-487 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished
More informationResearch on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game
International Jornal of Grid and Distribted Compting Vol. 9, No. 5 (06), pp.-0 http://dx.doi.org/0.457/ijgdc.06.9.5.8 Research on Pricing Policy of E-bsiness Spply Chain Based on Bertrand and Stackelberg
More informationOn the urbanization of poverty
On the rbanization of poverty Martin Ravallion 1 Development Research Grop, World Bank 1818 H Street NW, Washington DC, USA Febrary 001; revised Jly 001 Abstract: Conditions are identified nder which the
More information8 Service Level Agreements
8 Service Level Agreements Every organization of men, be it social or political, ltimately relies on man s capacity for making promises and keeping them. Hannah Arendt Key Findings Only abot 20 percent
More informationExecutive Coaching to Activate the Renegade Leader Within. Renegades Do What Others Won t To Get the Results that Others Don t
Exective Coaching to Activate the Renegade Leader Within Renegades Do What Others Won t To Get the Reslts that Others Don t Introdction Renegade Leaders are a niqe breed of leaders. The Renegade Leader
More informationData De-duplication from the data sets using Similarity functions
Data De-dplication from the data sets sing Similarity fnctions M.Chitrarpa 1, V.Mniraj Naid 2 1 M.Tech Stdent Department of CSE Adisankara College of Engineering & Technology Gdr, Nellore district, India
More informationThe Good Governance Standard for Public Services
The Good Governance Standard for Pblic Services The Independent Commission for Good Governance in Pblic Services The Independent Commission for Good Governance in Pblic Services, chaired by Sir Alan Langlands,
More informationTowers Watson Manager Research
Towers Watson Manager Research How we se fnd performance data Harald Eggerstedt 13. März 212 212 Towers Watson. All rights reserved. Manager selection at Towers Watson The goal is to find managers that
More informationKEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT
5 KEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT by: John Barrett Personal assistants (PAs) and their ability to effectively provide essential spports at the workplace are extremely important
More informationModeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc.
FSI-2-TN6 Modeling Roghness Effects in Open Channel Flows D.T. Soders and C.W. Hirt Flow Science, Inc. Overview Flows along rivers, throgh pipes and irrigation channels enconter resistance that is proportional
More informationEMC VNX Series Setting Up a Unisphere Management Station
EMC VNX Series Setting Up a Unisphere Management Station P/N 300-015-123 REV. 02 April, 2014 This docment describes the different types of Unisphere management stations and tells how to install and configre
More informationHealth Benefits Coverage Under Federal Law...
covers Labor Compliance 2014mx.pdf 1 11/19/2014 2:05:01 PM Compliance Assistance Gide Health Benefits Coverage Under Federal Law... The Affordable Care Act Health Insrance Portability and Accontability
More informationCandidate: Suzanne Maxwell. Date: 09/19/2012
Medical Coder / Billing Clerk Assessment Report Szanne Maxwell 09/19/2012 www.resorceassociates.com Szanne Maxwell 09/19/2012 Prepared For: NAME Prepared by: John Lonsbry, Ph.D. & Lcy Gibson, Ph.D., Licensed
More informationThe Good Governance Standard for Public Services
The Good Governance Standard for Pblic Services The Independent Commission on Good Governance in Pblic Services Good Governance Standard for Pblic Services OPM and CIPFA, 2004 OPM (Office for Pblic Management
More informationMining Social Media with Social Theories: A Survey
Mining Media with Theories: A Srvey Jiliang Tang Compter Science & Eng Arizona State University Tempe, AZ, USA Jiliang.Tang@as.ed Yi Chang Yahoo!Labs Yahoo!Inc Snnyvale,CA, USA yichang@yahooinc.com Han
More informationSTI Has All The Pieces Hardware Software Support
STI Has All The Pieces Hardware Software Spport STI has everything yo need for sccessfl practice management, now and in the ftre. The ChartMaker Medical Site Incldes: Practice Management/Electronic Billing,
More informationThe Institute Of Commercial Management. Prospectus. Start Your Career Here! www.icm.ac.uk info@icm.ac.uk
The Institte Of Commercial Management Prospects Start Yor Career Here! www.icm.ac.k info@icm.ac.k The fondation of every state is the edcation of it s yoth. Diogenes Laertis Welcome... Althogh we are
More informationWHAT IT TAKES TO WIN. In the Chinese App Market
WHAT IT TAKES TO WIN In the Chinese App Market JUNE 2013 Table of Contents Exective Smmary... 01 Introdction... 02 Research objective and methodology... 02 App landscape... 03 App discovery and download
More informationEffective governance to support medical revalidation
Effective governance to spport medical revalidation A handbook for boards and governing bodies This docment sets ot a view of the core elements of effective local governance of the systems that spport
More informationGalvin s All Things Enterprise
Galvin s All Things Enterprise The State of the Clod, Part 2 PETER BAER GALVIN Peter Baer Galvin is the CTO for Corporate Technologies, a premier systems integrator and VAR (www.cptech. com). Before that,
More informationIdentity Management & Access Control
4-day training abot increasing secrity and prodctivity while drecreasing cost, downtime and repetitive tasks with (IAM) International Management Form www.imfacademy.com Contents of this brochre What is
More informationResource Pricing and Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach
Resorce Pricing and Provisioning Strategies in Clod Systems: A Stackelberg Game Approach Valeria Cardellini, Valerio di Valerio and Francesco Lo Presti Talk Otline Backgrond and Motivation Provisioning
More informationBonds with Embedded Options and Options on Bonds
FIXED-INCOME SECURITIES Chapter 14 Bonds with Embedded Options and Options on Bonds Callable and Ptable Bonds Instittional Aspects Valation Convertible Bonds Instittional Aspects Valation Options on Bonds
More informationTechnical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements...
PostgreSQL backps with NetWorker Release nmber 1.0 302-001-174 REV 01 Jne 30, 2014 Adience... 2 Reqirements... 2 Terminology... 2 PostgreSQL backp methodologies...2 PostgreSQL dmp backp... 3 Configring
More informationPhone Banking Terms Corporate Accounts
Phone Banking Terms Corporate Acconts If there is any inconsistency between the terms and conditions applying to an Accont and these Phone Banking Terms, these Phone Banking Terms prevail in respect of
More informationCompensation Approaches for Far-field Speaker Identification
Compensation Approaches for Far-field Speaer Identification Qin Jin, Kshitiz Kmar, Tanja Schltz, and Richard Stern Carnegie Mellon University, USA {qjin,shitiz,tanja,rms}@cs.cm.ed Abstract While speaer
More informationIntroducing ChartMaker Cloud! STI Provides More Options Than Any Other Software Vendor
Introdcing ChartMaker Clod! STI Provides More Options Than Any Other Software Vendor ChartMaker Clinical 3.7 2011 Amblatory EHR + Cardiovasclar Medicine + Child Health The ChartMaker Medical Site is made
More informationSickness Absence in the UK: 1984-2002
Sickness Absence in the UK: 1984-2002 Tim Barmby (Universy of Drham) Marco Ecolani (Universy of Birmingham) John Treble (Universy of Wales Swansea) Paper prepared for presentation at The Economic Concil
More informationInferring Continuous Dynamic Social Influence and Personal Preference for Temporal Behavior Prediction
Inferring Continos Dynamic Social Inflence and Personal Preference for Temporal Behavior Prediction Jn Zhang 1,2,3,4 Chaokn Wang 2,3,4 Jianmin Wang 2,3,4 Jeffrey X Y 5 1 Department of Compter Science and
More informationChapter 3. 2. Consider an economy described by the following equations: Y = 5,000 G = 1,000
Chapter C evel Qestions. Imagine that the prodction of fishing lres is governed by the prodction fnction: y.7 where y represents the nmber of lres created per hor and represents the nmber of workers employed
More informationWelcome to UnitedHealthcare. Ideally, better health coverage should cost less. In reality, now it can.
Welcome to UnitedHealthcare Ideally, better health coverage shold cost less. In reality, now it can. The plan designed with both qality and affordability in mind. Consistent, qality care is vitally important.
More information