Peer-to-peer systems have attracted considerable attention

Size: px
Start display at page:

Download "Peer-to-peer systems have attracted considerable attention"

Transcription

1 Reputaton Aggregaton n Peer-to-Peer etwork Usng Dfferental Gossp Algorthm Ruhr Gupta, Yatndra ath Sngh, Senor Member, IEEE, arxv:20.430v4 [s.i] 28 Jan 204 Abstrat Reputaton aggregaton n peer to peer networks s generally a very tme and resoure onsumng proess. Moreover, most of the methods onsder that a node wll have same reputaton wth all the nodes n the network, whh s not true. Ths paper proposes a reputaton aggregaton algorthm that uses a varant of gossp algorthm alled dfferental gossp. In ths paper, estmate of reputaton s onsdered to be havng two parts, one ommon omponent whh s same wth every node, and the other one s nformaton reeved from mmedate neghbours based on the neghbours dret nteraton wth the node. The dfferental gossp s fast and requres less amount of resoures. Ths mehansm allows omputaton of ndependent reputaton value by a node, of every other node n the network, for eah node. The dfferental gossp trust has been nvestgated for a power law network formed usng preferental attahment PA) Model. The reputaton omputed usng dfferental gossp trust shows good amount of mmunty to the olluson. We have verfed the performane of the algorthm on the power law networks of dfferent szes rangng from 00 nodes to 50,000 nodes. Index Terms Trust, Reputaton, Dfferental Gossp, Free Rdng, Colluson. Introduton Peer-to-peer systems have attrated onsderable attenton n reent past as these systems are more salable than the lent-server systems. But, free rdng has emerged as a bg hallenge for peer-to-peer systems [], [2]. Tendeny of nodes to draw resoures from the network and not gvng anythng n return s termed as Free Rdng. As nodes have onfltng nterests so, selfsh behavour of nodes leads to problem of free rdng [3]. Ths behavour of nodes an be explaned by famous prsoners dlemma [4]. In a fle sharng network, f nodes are onsdered as players, ther E wll be the strategy where none of them wll share the resoures [5]. Expermental studes [6], [7] on Gnutella network onfrmed ths fat. Trust or reputaton management systems an be used n peer to peer networks to overome the problem of free rdng as well as to ward off some of the attaks [8], [9]. Suh reputaton management systems have been n e-ommere portals lke e-bay [0], but they have the advantage that they are based on lent server arhteture. In peer-to-peer fle sharng networks, as there s no entral server or repostory, trust has to be estmated and stored by eah node n a dstrbuted fashon, and all suh trust values need to be aggregated to buld an effetve reputaton management system. Aggregaton of trust generally onsumes a lot of tme and memory espeally wth large number of nodes. Apart from t, exstng methods assume that the reputaton of a peer must have a global value,.e. the peers behave unformly wth all other peers, but ths s not true. In ths paper, we propose Ruhr Gupta and Yatndra ath Sngh are wth the Department of Eletral Engneerng, Indan Insttute of Tehnology, Kanpur, Inda. E-mal:{rgupta, ynsngh}@tk.a.n a method whh aggregates the trust estmated by a node dretly, trust reported by neghbours and trust averaged usng a varaton of gossp algorthm to make trust vetors at eah node. Studes show that unstrutured peer-to-peer networks generally follow Preferental Attahment PA) model. In partular Gnutella has a power law degree dstrbuton f d) d α wthα2.3 [9], [23], [24]. Therefore ths algorthm has been smulated for networks havng power law degree dstrbuton,.e. networks formed by Preferental Attahment PA) model [], [2]. Aordng to [2], a graph G m evolves from G m when a new node wth m edges ons the network. Here m s the number of onnetons that the new node wll make at the tme of onng the network. The onng nodes hooses a node wth probablty P gven by degree o f node be f ore ths onneton s made P sum o f degree o f all the nodes be f ore ths onneton s made. Remander of ths paper s organsed as follows. Seton two presents the related work n reputaton management. Seton three desrbes the system model. Seton four, proposes the dfferental gossp trust algorthms for the aggregaton of trust. Seton fve presents the analyss of the algorthms and numeral results. Seton sx onludes the presented work. 2 Related Work Many methods have been proposed n the lterature [3], [4], [5], [6], [7], [8] for the reputaton aggregaton. Egen-Trust [3] depends largely on pre-trusted peers.e. peers that are globally trusted. Ths s salable to a lmted extent. Peer-Trust [4] stores the trust data.e. trust values of all the peers n the network) n a dstrbuted fashon. Ths s performed usng a trust manager at every node. In Peer-Trust, hash value of a node d s alulated to dentfy the peer where the trust

2 2 value of the node wll be stored. Song et.al. [5] used fuzzy nferene to ompute the aggregaton weghts. These weghts are assgned on the bass of global trust value of the opnng peer, transaton amount and date of transaton wth the peers beng evaluated. In Fuzzy- Trust, eah peer mantans a loal trust value and the transaton hstory wth the remote peers. At the tme of aggregaton, system queres for the trust value, from the qualfed peers, for the peer beng evaluated, and ombne the reeved values usng aggregaton weghts to ompute the updated trust values. The trust value alulated n ths way s global n nature. Zhou et.al. [6] dentfed the power law dstrbuton n the users feedbak by observng ebay transaton traes. Power Trust leverage on ths dstrbuton. Every node keeps the reord of loal trust sores of the nodes wth whom t has nterated, as per the qualty of serve obtaned from them. Global reputaton s alulated by weghted aggregaton of loal trust sores. The global reputaton of opnng node s taken as weght. Smlar to fuzzytrust, trust value generated here are global and all peers n the network use the same value for all the transatons. Gossp Trust [7] uses push gossp algorthm as gven n [2] for aggregaton n omplete graph based network. Ths ensures fast reputaton aggregaton wth low message overhead. Ths tehnque also alulates the global reputaton of a node by weghted aggregaton of opnons of dfferent nodes. It also uses the bloom flter arhteture for the effent rankng. [2] analyses gossp algorthm for aggregaton of nformaton n omplete graph based network and also omes up wth a upper bound on onvergene. Ths paper also studes dffuson n the network. As evdent, generally the earler work [3], [4], [6], [7] assumes that the reputaton of a peer must have a global value,.e. peers behave unformly wth all the peers. But ths s not the ase due to nodes beng selfsh n nature. A peer behaves wth dfferent deeny levels wth dfferent peers. The same holds true for the opnon as well,.e. peer gves dfferent weghts to opnons of dfferent peers. These aspets have been taken nto aount n our algorthm alled Dfferental Gossp Trust. The urrent work ombnes loal, reported value from trusted neghbours and global trust usng the new varaton of gossp to defne a novel trust aggregaton algorthm. 3 System Model In ths paper, we are studyng a peer-to-peer network. Typally, there wll be mllons of nodes n a peer-topeer network. These nodes are assumed to be onneted by a network graph G m generated by PA preferental attahment) proess [9] for m 2. Here, all the nodes whose addresses are stored by a node, are onsdered to be neghbours of the node. Generally the nodes wll have small number of neghbours. There s no dedated server n ths network. Peers n ths network are ratonal,.e. they are only nterested n ther own welfare. They are onneted to eah other by an aess lnk followed by a bak bone lnk and then agan by an aess lnk to the seond node. We are assumng that the network s heavly loaded.e. every peer has suffent number of pendng download requests, hene these peers are ontendng for the avalable transmsson apaty. We also assume that every peer s payng the ost of aess lnk as per the use for both download and upload as per the bllng prate of most of the serve provders). Downloaded data s more valuable than the ost of aess lnk. Moreover, data that s of nterest to peer s always avalable. So, every peer wants to maxmses ts downloads and mnmse ts uploads so that t an get maxmum utlty of ts spendng. Ths optmsaton leads to problem of free rdng. If a node s downloadng, some other node has to upload. So the desred ondton s that the download should be equal to upload for a node. Usually ths means that there s no gan. Even n ths senaro, the node gans due to nteraton wth others, as the hanes of survval of any entty s more wth ommunaton apablty. Thus nteraton tself s an nentve. A node wll usually try to get the ontent and avod uploadng to maxmse gan. Thus free rdng beomes optmal strategy. So a reputaton management system need to be enfored to safeguard the nterest of every node by ontrollng the free rdng behavour. In a reputaton management system, every node mantans a reputaton table. In ths table, a node mantans the reputaton of the nodes wth whom t has nterated. Whenever t reeves a resoure from some node, t adusts the reputaton of that node aordngly. When another node asks for the resoure from ths node, t heks the reputaton table and aordng to the reputaton value of the requestng node, t alloates resoure to the other node. Ths ensures that every node s faltated from the network as per ts ontrbuton to the network and onsequently free rdng s dsouraged. For usng suh a reputaton management system, the nodes need to estmate the trust value of the nodes nteratng wth them. There are number of ways to estmate the reputaton [20]. We assume that trust value observed by node a for the node an be defned as t. 4 Aggregaton of Trust Whenever a node needs a resoure, t asks from ts neghbours; f they have the resoure, the node gets the answer of ts query. If neghbours do not have t, they forward the query to ther neghbours and so on. The node that have the resoure, reples bak to the requestng node. The requestng node now asks for the resoure from the node havng the resoure. The answerng node provdes the resoure now dretly aordng to the reputaton of the node. If a node reeves a request from another node that s not ts neghbour, the reputaton of that node needs to

3 3 be estmated some how n order to dede the qualty of serve to be provded. If two nodes are gong to transat for the frst tme they should have reputaton of eah other. Ths an be done by gettng the reputaton of node from neghbours and then usng t to make an ntal estmate. When for a node, multple trust values are reeved, we need an aggregaton mehansm to get the trust value. Trust value should always le n between zero and one. For the whole network, we an defne a trust matrx of dmensons. Here t represents the trust value of as mantaned by based on dret nteraton. Ths matrx s generally sparse n nature as generally a node wll have very small number of neghbours beng dretly transated wth as ompared to total number of nodes n the network. It may be noted that t s estmated based on transaton between nodes and and an be alled as loal trust value. These trust values wll be propagated and aggregated by all the nodes n a network. The trust estmate whh should be atually used wll be based on aggregaton of loal trust values and trust estmates reeved from neghbours. For the reputaton nformaton reeved from dret neghbours, the weghts an be assgned based on neghbours reputaton. 4. Dfferental Gossp Trust We have modfed the gossp based nformaton dffuson algorthm to allow faster dffuson of the trust values enablng faster estmaton of global trust vetors at all the nodes. The algorthm an be dvded nto two parts. In frst part, we wll dsuss about the method of nformaton dffuson whereas n the seond part, we wll dsuss about the nformaton that s to be dffused. 4.. Dfferental Gossp Algorthm Gossp Algorthms are used for spreadng nformaton n large deentralsed networks. These algorthms are random n nature as n these, nodes randomly hoose ther ommunaton partner n eah nformaton dffuson step. These algorthms are generally smple, lght weght and robust for errors. They have less overhead ompared to the determnst algorthms [2], [22]. The gossp algorthms are also used for the dstrbuted omputaton lke takng average of the numbers stored at dfferent nodes. These algorthms are sutable for the omputaton of reputaton vetor n the peer-to-peer networks [7]. There are three types of gossp algorthms: push, pull and push-pull. In push knd of algorthms, n every gossp step, nodes randomly hoose a node from ts neghbours and push a pee of nformaton to t. Whereas n pull algorthms, nodes take the nformaton from one of the randomly seleted neghbourng node. Both these proesses happen smultaneously n the pushpull based algorthms. Cherhett et.al. [25] stated that n a PA model based network, push or pull alone wll take long n spreadng the nformaton n the network. If the push model s mplemented and the nformaton s wth a power node, t wll take many rounds n pushng nformaton to low degree nodes. If pull model s beng used, and the nformaton s wth low degree node, t wll agan take many rounds for a power nodes to pull the nformaton. Ths phenomenon wll be evdent n the average omputaton usng push or pull gossp algorthm as nformaton of every node need to be dstrbuted to every other node. To avod ths problem we propose dfferental push gossp algorthm. In ths algorthm, every node makes dfferent number of pushes dependng upon the rato of ts own degree to the average neghbour degree. n a sngle gosspng step. If every node also pushes ts degree to all the neghbourng nodes, then eah node an estmate the average degree of all ts neghbours. Here, we make three assumptons, ) every node has a unque dentfaton number known to every other node. So, f some node pushes some nformaton about another node, reevng node knows that ths nformaton s about whh partular node; ) tme s dsrete; and ) every node knows about the startng tme of gossp proess. All nodes that have some feedbak about a sngle node, gossp ther feedbak about that sngle node. All the nodes estmate the global reputaton of the sngle node based on the outome of gossp. Let the feedbak about the th node by node be y. If t does not have any feed bak about t keeps the value of y as 0. Every node that has feed bak about node assumes the gossp weght g as and rest of the nodes assume the gossp weght as zero. It s done so that as a result of gossp, every node overages to the rato of summaton of all gossped values as well as summaton of all gossp weghts averaged over all the nodes. The rato of two y onverged values,.e. g gves the sum of gossped values averaged over node who started wth gossp weght of unty. If only one of the nodes assumes gossp weght as unty and remanng as zero, all nodes wll be able to estmate the summaton of gossped values. Every node has y and g as nformaton to be gossped. Let us all ths par as gossp par. The rato of gossp par s traked n every step to dede on onvergene. Every node, frst alulates the rato k of ts own degree and average degree of ts neghbours. As k wll be a real number, t s rounded off to nearest nteger f k. For all other ases, k. The node hooses k nodes randomly n ts neghbourhood and sends k y, k g ) as gossp par to all randomly seleted k nodes and tself. The node s also onsdered as one of the neghbours of tself. After reevng all gossp pars from dfferent nodes nludng tself, the node sums up all the pars. Ths summaton now beomes new gossp par. The rato of ths gossp par s the value that node has evolved n ths step. If at least one gossp par has been reeved from a node other than tself, the ondton of onvergene wll

4 4 be heked between the ratos of ths step and prevous step wth a predefned error onstant. If onvergene ondton s satsfed, t means a node needs not to run the gossp proess any more for ts onvergene. But one onvergene s aheved by a partular node, onvergene of other nodes s not assured. Hene, f a node wll stop gosspng, onvergene of ts neghbours may suffer. To avod ths problem, one a node gets onverged, t wll announe among all ts neghbours that t has aheved onvergene. Every neghbour wll note ths announement. When a node fnds that tself and all ts neghbours have onverged, t wll stop the gossp proess. When a round of gosspng starts t takes some tme to omplete. After gosspng, nodes get a value that s used tll the next new value s onverged upon at the end of next round. After the end of a round, next round of gossp wll start after some tme. The tme dfferene between the two rounds wll depend upon the hange n the behavour of the nodes n the network and the number of new nodes omng n the network per unt tme. For smplty, ths tme dfferene has been taken as a onstant. In realty, ths should be dynamally adusted Dfferental Reputaton Aggregaton When a node requests resoure from another node, the node needs the reputaton of node so that t an dede the qualty of serve to be offered to node. There are two possble ondtons between node and node. Frst, node may have served node earler and hene node has some trust value about node. In ths ase there s no problem for node and node wll serve as per the reputaton avalable wth t. Seond, node and node are unknown to eah other. In ths ase node needs general reputaton about node. For ths, aggregaton of reputaton s needed. Aggregaton of reputaton should not be resoure ntensve and should be mmune to olluson and whtewashng. We an have two knd of optons for ths. Frst, by gosspng all the nodes an reah a onsensus about the reputaton of node [7]. Seond all the nodes exhange ther reputaton tables about the nodes they have nterated wth and ths proess should always be runnng, lke exeutng a routng protool at network layer. Frst proess s more vulnerable to olluson where as seond proess s resoure ntensve. As we an see that unstrutured peer-to-peer network s very smlar to human network, thus we an observe the human behavoural strateges to dentfy the soluton. In human network when we need the reputaton value of some body we rely on personal experene wth hm. If we don t have any personal experene wth hm, we rely on two thngs. Frst the general perepton about hm whh we reeve from gossp flowng around and seond the nformaton gven by our frends f they have any dret nteraton wth hm. We ombne these two and at aordngly. odes follow the same knd of approah n our proposed algorthm. The nodes gather opnon of ther neghbours and ombne t wth the opnon, obtaned from general gossp after weghng the neghbours opnon aordng to the onfdene n the neghbours. In general, t an be sad that a node gves weght to every node n the network. The nodes that have not nterated wth t are gven weght as where as those whh have nterated are gven weght aordng to the onfdene n them always ). Let us onsder that there are nodes n the network. Every node perodally alulates the trust value of the other nodes on the bass of qualty of serve provded by them aganst the requests made. Let us assume that t s the trust value measured by node for node. Here t, ) wll always le between 0 and suh that the t wll represent the omplete trust n node, whereas, t 0 wll represent no trust n the node. If a node A has not transated wth a node B, then the trust value of node B wll also reman 0 wth the node A. Ths ntal value s taken as 0 to avod the whte washng attak. Ths ntal value an also be taken as hgher than zero and an be dynamally adusted thereafter as per the level of whtewashng n the network. In ths paper, we have not studed ths aspet. We wll dsuss the algorthm n four steps to make t smple to understand. In the frst step, global reputaton aggregaton for a sngle node wll be dsussed. In the seond step, we wll dsuss globally albrated loal reputaton aggregaton for ths sngle node. In the thrd step, smultaneous global reputaton aggregaton for all the nodes wll be dsussed, and fnally n the fourth step, smultaneous aggregaton of globally albrated loal reputaton aggregaton for all the nodes wll be dsussed. In the frst step to keep thngs the smple, we assume that weghts of all the nodes for every node be. Ths leads us to alulaton of global reputaton R global ) of a node. Ths an be equvalently represented usng a matrx vetor multplaton as follows, R global n) tt n) ). ) Here n s the tme nstant and R global s the global reputaton vetor ontanng global reputatons of dfferent nodes. Let us assume that R s global reputaton of th node.e. th element n R global n) olumn vetor. s a vetor of s,.e. [...] T. Dfferental Gossp algorthm an be used for dong ths omputaton n dstrbuted fashon. Ths proess s shown n algorthm. Although eah node onsders the average of feedbaks from every other node n the network, t s desrable to assgn dfferent weghts to the dret feedbaks reeved from neghbourng nodes. The dret feedbak from a node s based on the dret nteraton whh t had experened. The weghts an be assgned by a

5 5 degree o f average neghbour degree ) Algorthm Global Reputaton aggregaton for a sngle node Requre: t The reputaton estmated by node for node only on the bass of dret nteraton) for, gossp error tolerane ξ Ensure: Global Reputaton of node R ) f has some reputaton value about then Assume weght g, and y t else Assume weght g 0, and y 0 end f Push self degree to neghbourng node Take the average of neghbours degree Calulate the rato of ts degree and average of neghbour degree k Round off k to nearest nteger for k else take k m {Intalse Gossp Step} u y g for nodes havng g 0; otherwse u 0. repeat Do for node y s, g s ) are all pars of gossp weght and gossp value) reeved by the node n the prevous step y y s ; g g s {update gossp pars}{s s s S s S the set of nodes sendng the gossp to } hoose k random nodes n ts neghbourhood send gossp par k y, k g ) to all k nodes and also to tself m m{nrement the gossp step} f S > then f y g u ξ then Inform all neghbours about self onvergene end f end f u y g for nodes havng g 0; otherwse u 0. untl Self onvergene and all neghbours onvergene has happened output R y g node on the bass of number and qualty of transatons made wth the other node who s provdng the feedbak. The trust value of a node s a good metr of qualty and number of transatons. The weghts for dfferent nodes an be derved on the bass of the trust values of these nodes. Same dea s used n seond varaton of algorthm where nodes estmate globally albrated loal reputaton vetor. So n seond step, we propose the weght w to be of the form: w a b t. 2) Here a and b are two parameters that a node an dede on ts own. Frst parameter an be adusted aordng to the overall qualty of serve reeved by the node from the network, whereas seond parameter an be adusted aordng to the reommendaton of a partular neghbour and qualty of serve from the network. So the seond parameter wll be adusted for every neghbour ndependently. In ths paper, a and b has been taken as the onstants for every node for smplty. Salent features of ths sheme are as follows. Even f a node has no neghbourhood relatonshp wth the estmatng node, ts feed bak wll stll get some onsderaton. If a node has bad reputaton wth the estmatng node, ts feedbak wll have weght lose to the node whh have no neghbourhood relaton wth the estmatng node. odes wth hgher reputaton wll be gven hgher weghts and t wll help n makng better qualty of serve groups. Values of a and b an be dynamally adusted by nodes as per ther requrement. Though n ths work, a and b have been taken as onstants. Colluson wll be sgnfantly redued. A weghted trust matrx, that s dfferent at every node, s formed by multplyng trust values wth weghts.e. for node I, the element n weghted matrx wll be W I suh that, W I w I t. 3) A node gves hgh weght to the feedbak gven by those nodes whh have provded better qualty of serve. Ths leads to the alulaton of globally albrated loal reputaton vetor. It s a olleton of the reputaton of all the nodes n the network aordng to reeved feedbak about the node and the weghts of nodes gvng feedbak to the alulatng node. It means f some node I s alulatng globally albrated loal reputaton vetor, the th element of ths vetor wll be Rep I, W I. 4) w I ow globally albrated loal reputaton at node I, R glr I an be equvalently represented as the matrx vetor multplaton R glr I n) Sum I W T I n) ). 5) Here Sum I w I. It s nterestng to see that f we onsder the weghts of all nodes as n 5), ths equaton degenerates to ). Eah node wll have four dfferent knd of data about other nodes - frst t.e. the trust value as result of dret nteraton, seond y, the ntermedate varable for gosspng and thrd g, gosspng weght. In the start of every gosspng round y assume the value of t whereas g wll be only for one of the values of, and 0 for all the others. Ths wll happen for all values of and. Fourth value Rep s obtaned after gosspng and onsderaton of neghbours opnon. It wll also be mantaned at every node. Apart from these four

6 6 enttes, we also wants to ount the total number of nodes opnng about node. For ths purpose every node that have opned about node wll assume ount and others wll assume ount 0 and hene n the proess of gossp, all these s wll sum up and we wll get the ount. Equaton 4) an be alternatvely represented as, W I W I S I S I Rep I, w I, w I S I S w I t w I t S I S I w I, w I S I S I w I ) t w I ) t t S I S I w I ) w I ). S I S I Here S I s the set of neghbours of node I. As neghbourhood between two nodes s based upon the nteraton between them so for non neghbour nodes the weght wll be. Usng ths fat, w I ) t S I Rep I, w I ) S I t. 6) In order to ompute the globally albrated loal reputaton of node, eah node wll need the reputaton of as estmated by neghbours on the bass of the dret nteraton wth node. Whereas n the gossp algorthm, after every step, the value at the node keeps on hangng as t gets added to the values pushed by other nodes and s dstrbuted after dvson to neghbours. After few steps, the values onverge when nomng and outgong values statstally balane eah other. Hene after the frst step of gosspng t s dffult to get the value of t from a neghbour for the nodes wth whom t has dret nteraton, by gosspng proess. If a node s partpatng n the proess of gossp about node for the frst tme or reputaton of node at ths node has hanged onsderably sne start of prevous round of gossp, ths node wll nform the reputaton of node to all of ts neghbours before the start of next gosspng round fgure ). Ths wll be done by all the nodes. After ths proess, every node has opnon of ts neghbours about node If a node does not nform reputaton of, the already avalable earler value wll be onsdered). If node wll not hear from a node for a long tme, t wll assume that ths node s no longer present and hene t wll drop ts feedbak after some tme. ow these reputatons wll be multpled by W I ) as requred n equaton 6) and summed up as value ŷ I see algorthm 2). ow normal gossp wll be done as n algorthm 2 wth a dfferene that only one node wll be gven gossp weght and rest wll be gven 0 gossp weght The nodes that have reputaton nformaton about node Fg.. Sequene of omputaton for estmatng globally albrated loal reputaton at eah node under onsderaton.e., ) wll also push ount. After stablsaton of gossp, eah node wll have d), where d s number of nodes havng dret nteraton and s total number of nodes, sum of total values/total number of nodes, and as gossp weght. Ths wll lead to the summaton of all reputaton values avalable and total number of nodes gvng these reputaton values. ow reputaton an be alulated usng 6)[algorthm 2]. Algorthm 2 Globally albrated loal Reputaton aggregaton for a sngle node Requre: Feedbak matrx t, gossp error tolerane ξ. Ensure: Globally albrated loal Reputaton of node Rep ) Assume weght g ode do f then g 0 end f f has some reputaton value about then take ount, and y t else take ount 0, and y 0 end f alulate w for all neghbours of by formula w a b t f ode s partpatng frst tme n gosspng proess then Push feedbak due to dret nteraton about the node under onsderaton to all neghbours else f Feedbak about the node under onsderaton has hanged by more than some onstant then Push the new feedbak to all the neghbours end f end f Push self degree d to neghbourng nodes Calulate ŷ d w k ) f eedbak f rom node k about k Algorthm Contnued...

7 7 degree o f average neghbour degree ) Algorthm Algorthm 2 ontnued) Take the average of neghbours degree Calulate the rato of ts degree and average of neghbour degree k Round off k for k else take k End do m {Intalse Gossp Step} u y g for nodes havng g 0; otherwse u 0. repeat Do for node y s, g s, ount s ) are all 3-tuples of gossp value of reputaton, gossp weght and ount reeved by node n the prevous step y g s ; ount ount s {update s S s S y s ; g s S gossp pars} {S s the set of nodes sendng the gossp to } hoose k random nodes n ts neghbourhood send gossp par k y, k g ) to all k nodes and tself m m{nrement the gossp step} f S > then f y g u ξ then Inform all neghbours about self onvergene end f end f u y g for nodes havng g 0, otherwse u 0. untl Self onvergene and all neghbours onvergene has happened outputrep ŷ y g wk ) ount g In thrd varaton we want to aggregate the global reputaton of all nodes smultaneously. Ths algorthm s qute smlar to algorthm exept few hanges. Unlke algorthm, node wll push omplete vetor y whh onssts of feedbak from node about all the other nodes t has transated wth. Smlarly, nstead of sngle gossp weght g, node wll send vetor g. A node d wll also be attahed wth every par of y and g so that reevng node an dstngush among gossp pars. So, n fat, node pushes gossp tro onsstng of y, g and node d. The onvergene of algorthm s heked by the followng ondton: y n) g n) y n ) g n ) ξ 7) Where n s the tme nstant andξs the permssble error bound. In the fourth varaton we want to aggregate the globally albrated loal reputaton of all the nodes smultaneously. Ths algorthm s qute smlar to seond varaton expet that we wll use the thrd varaton for gosspng proess. Moreover n ths varaton nodes wll push full vetor t, n plae of only t for node. Fg. 2. Topology of the example network It an be noted here that the tme omplexty of all four varatons of algorthm wll be of the same order beause reputatons of all the nodes wll be pushed smultaneously as a vetor. Whereas the ommunaton omplexty n thrd and fourth varaton wll nrease proportonally to the sze of vetor, as now the reputaton aggregaton s happenng for these many nodes. 4.2 Example for Dfferental Gossp Algorthm We wll onsder a network of 0 nodes and observe the aggregaton n ths network. Fgure 2 shows the topology of the network. Table 2 shows the aggregated value after every teraton at eah node. 5 Analyss of Algorthm 5. Analyss of onvergene of Gossp Algorthm In ths seton we wll study the tme needed by nodes to onverge to the average of loal dret estmate values at dfferent nodes. Frst, we wll study the spreadng of gossp n power law network. Then, we wll study the dffuson speed of gossp. Then, we wll study the dffuson speed of gossp. We have taken power law network as most atual P2P network tends to follow power law degree dstrbuton. Based on these results, we wll fnd the tme of onvergene. Cherhett et.al. [25] proved that n PA based graph, {G m } for m 2 push or pull alone wll fal n spreadng the gossp. They also proved that push-pull wll sueed n Olog 2 ) 2 ) tme steps where low degree nodes push nformaton to low degree nodes and power nodes and pull nformaton from power node. But n a peer-to-peer networks, t s dffult to dentfy the power nodes. Moreover pullng the nformaton s more expensve than pushng the nformaton. So we have proposed to use dfferental push gossp n plae of push pull gossp. In the followng theorem we have proved that the dfferental push gossp wll take same tme as the push pull gossp. Theorem 5.. Gossp wll spread wth hgh probablty n a PA based graph,{g m } for m 2, wthn Olog 2) 2 ) tme

8 8 ode degree k 3 tr tr tr tr tr tr tr tr TABLE Aggregated value after every teraton at eah node usng dfferental-push by hgh probablty we mean, o), where o) goes to zero as nreases). Proof: Dfferental push means that every node wll push ts data to dfferent number k ) of nodes nstead of one node. Here k s the rato of node s degree and average degree of all ts neghbours. {G m } for m 2 an be thought as the unon of few fnte onneted omponents. These omponents wll onsst of many low degree nodes wth average degree log 2 and few hgh degree power nodes. These omponents wll have dameter as log 2. In a network omponent) wth average degree log 2 and dameter log 2, the gossp wll spread n wthn Olog 2 ) 2 ) steps usng normal push [26]. But, these omponents also have power nodes that may lead to large spreadng tme n that omponent [25]. As power nodes wll have hgh degree and makng one push at a tme wll take longer n transferrng the nformaton to all of ts neghbours. Therefore f some low degree node s onneted only to power nodes, the nformaton transfer to that node wll take muh longer. Dfferental push wll solve ths problem beause now power nodes wll be makng multple pushes as per the rato of degrees of neghbour nodes and degree of the node tself. Hene, n every omponent, gossp spreads wthn Olog 2 ) 2 ) steps usng dfferental push. As there are fnte suh omponents, gossp wll spread n omplete network wthn Olog 2 ) 2 ) steps. In our ase, few nodes have nformaton reputaton of a node) that has to be averaged and ths average has to be spread to all the nodes. So we wll prove the onvergene for the ase where every node has nformaton whh has to be averaged. Let at n0, eah node has a number. For th node ths number s d 0,. So the obetve of gossp s to have d 0, d avg at eah node after some rounds of gossp. The number of rounds needed should be least possble. For n0, the gossp weght at eah node wll be unty. After n steps, let the node have the evolved number as d and evolved gossp weght as g. To study the tme taken n the onvergene of algorthm we assume that eah node mantans a vetor m. The dmenson of ths vetor wll be. Ths vetor wll reord the ontrbuton reeved from every node nludng tself about the node m. So ntally at n 0 eah node wll have a vetor n whh ) elements wll be zero and one element, the one for tself, wll be unty. If n the proess of frst step of gosspng, only the node hooses node for pushng the gossp about m, then the ontrbuton by to.e. m wll be n,, reorded n the th element of ontrbuton vetor of node. So after frst step of gossp the ontrbuton vetor of wll ontan two non-zero elements one reeved from and one pushed to tself. We assume here that only push has been reeved by node. In ase of l pushes beng reeved the vetor wll have l non zero entres. ow node wll hoose some node o. ode wll push the omplete ontrbuton vetor dvded by p f p push gossp s under onsderaton) to node o. ow node o wll do vetor addton of all the reeved vetors nludng the one reeved from tself. The resultant vetor wll be the new ontrbuton vetor. Ths proess wll be repeated at all the nodes. So t an be sad that d m m n,, d m suh that 0, g m m. When a node wll reeve same amount n,, of ontrbuton from all nodes, at that tme the rato of evolved number d m ) and evolved gossp weght gm ) wll be the average of all the numbers. Theorem 5.2. Unform Gossp dffuses wth dfferental push n PA based graph wthn Olog 2 ) 2 log 2 ξ ) tme wth hgh probablty suh that ontrbutons at all nodes wll be ξ unform after ths amount of tme,.e. max m ξ where n,,. On the bass of these two theorems, t an be seen as n [2]), that wth hgh probablty relatve error n average estmaton and sum estmaton f only one node s gven weght one and others are gven zero) wll be bounded byξafter Olog 2 ) 2 log 2 ξ ) gossp steps. 5.2 Analyss of Colluson In our proposed system a node may get trust values about a node by three possble ways, frst by dret nteraton, seond from neghbours and thrd by gosspng. Frst mehansm an not be affeted by olluson. We m n,,

9 9 are assumng that seond mehansm wll also not be affeted by olluson as neghbours have a defnte level of trust for eah other. We are onsderng the olluson beause of thrd mehansm. For analyss of olluson, we wll alulate the dfferene of real reputaton and estmated reputaton of a node by some node o n the presene of olluson usng our proposed method, we wll ompare t wth the method proposed n [7]. Lets us assume that the network s formed by the member nodes of set. There s a subsetcof setsuh that member nodes of set C are nvolved n olluson. The ardnalty of sets and are assumed to be and C respetvely. We also assume that members nodes of setcare olludng n groups wth a group sze of G. By olludng n a group we mean that f some node s the member of that group then group members of olludng group wll report ts reputaton as. Whereas for others nodes they wll report the reputaton value as 0. Let us say that real reputaton of a node s R, and estmated reputaton s real R est, f s a olludng node, R estn, f s not a olludng node. t R real. 8) Here t s normalsed trust value of the node x at node. If s not a olludng node then, R estn If s a olludng node, then R est t \C \C. 9) t G. 0) So the expeted value of reputaton estmate E[R est ]) wll be t G \C t \C E[R est ] C ) C GC t \C 2 ) So dfferene n real reputaton and expeted value of estmated reputaton by node o for node R o old ) wll be, t C R o GC old 2. 2) ow, we norporate the trust based weghted opnon of neghbours. Lets us assume that w o s the weght gven to the opnon of node by node o. It may be noted w o, equaton 2). So the real reputaton of node for node o wll be, R real t w o )t w o ). 3) If x s not a olludng node then, t w o )t R estn \C w o ). 4) And f s a olludng node then, t w o )t G R est \C w o ). 5) So the expeted value of reputaton estmate E[R est ]) wll be t w o )t G E[R est ] \C C w o ) C ) t w o )t \C w o ) GC w o )) t w o )t \C w o ). 6) So dfferene n real reputaton and expeted value of estmated reputaton by node o for node R o new)wll be equaton 6 - equaton 3), R o new GC w o )) C w o ) w o )) GC t C 2 w o )) Ro 7) old 5.3 umeral Results Performane of algorthm for reputaton aggregaton for peer to peer fle sharng system s also evaluated by smulaton as well. The smulaton experments has been onduted for 00 to nodes. A power law network has been bult usng Preferental Attahment model. Performane of dfferental algorthm has been evaluated n terms of number of teratons to assess the rate of onvergene) requred to onverge wthn a ertan aggregaton error. umber of pakets per node per gossp step that are requred to be transmtted for onvergene have also been alulated to assess the network overhead. Algorthm has also been tested aganst olluson. Fgure 3 shows the number of gossp steps requred for dfferent error bounds for dfferent number of nodes. t

10 0 Ths s learly evdent that number of gossp steps s nreasng wth a rate muh less than normal push gossp. Peer to peer networks operate above TCP layer,.e. these knd of networks assume a relable bt ppe between sender and reever. So peer to peer network suffers by paket loss only when some node leaves the network.e. due to hurnng.fgure 4 shows the requred number of gossp steps wth dfferent paket loss probablty for 0000 nodes. Here the assumpton s when a node leaves durng gossp proess, t hands over the gossp par vetors to some other node so mass onservaton stll apples. Whenever a node pushes gossp par to ths absent node, the pushng node doesn t reeve any aknowledgement. In suh ases pushng node pushes the gossp par to tself so that mass onservaton stll apples. We an see a small nrement n the number of gossp steps wth the nrease n the paket loss probablty. Fgure 5 and 6 shows the mmunty of algorthm aganst olluson n terms of RMS error n ase of ndvdual fg 6) and group olluson fg 5). Here average RMS error s defned as follows. Average RMS error r ˆr )/r ) 2 8) Here r s the reputaton of node at node omputed by dfferental gossp n presene of olludng nodes, whereas rˆ s the omputed reputaton f olludng nodes would not have been there. Ths s learly evdent that effet of olluson on reputaton omputaton by dfferental gossp s qute less even wth very hgh perentage of olludng users. The olludng group sze s makng a small dfferene n dfferental gossp reputaton omputaton. Table 2 shows the number of message transfers requred by a node n one gossp step. It an be seen that ths s dereasng slghtly wth the nrease n number of nodes. Ths s happenng beause as number of gossp steps nreases the overhead nurred n the begnnng gets dstrbuted and a node s less burdened as the number of total nodes nreases. Smlar thng happens when a lower value ofξs hosen. Ths s also evdent from Table 2 and fg 3 that n ase of dfferental gossp per step ommunaton ost s more than normal push gossp but total ommunaton ost for onvergene s less for networks bgger than 000 nodes moreover ths dfferenes nreases substantally as network sze nreases. We have not verfed t for normal pull gossp but ntutvely t an be observed that same thng wll be true. 6 Conluson In peer-to-peer networks, free rdng s a maor problem that an be overome by usng reputaton management system. A reputaton management system nludes two Fg. 3. Gossp step ounts wth dfferent number of nodes) and dfferent error boundsξ Fg. 4. Gossp step ounts for 0000 wth dfferent error boundsξ for dfferent paket loss probablty proesses, frst estmaton of reputaton and seond aggregaton of reputaton. In ths paper we have proposed an aggregaton tehnque by modfyng push gossp algorthm to dfferental push gossp algorthm. The proposed aggregaton tehnque effently aggregates the trust values from dfferent nodes n a power law network. Ths tehnque does not requre the dentfaton of power nodes. Ths makes algorthm easly mplementable as dentfaton of power nodes n a dstrbuted settng s hard. Ths algorthm s also robust aganst hurnng as an be seen n fgure 4. Proposed tehnque aggregates the reputaton n a dfferental manner. Ths s done by onsderng the feedbak of trusted nodes wth a hgher weght. Ths leads to robustness aganst olluson as evdent from fgure 5.

11 ξ0.0 ξ0.00 ξ0.000 ξ TABLE 2 umber of messages per node per step transmtted due to gosspng Fg. 5. Average RMS error wth dfferent sze olludng groups for dfferent perentage of olludng peers Fg. 6. Average RMS error wth ndvdual peers for dfferent perentage of olludng peers Proposed algorthm has been presented to avod the problem of free rdng but t an also be used to avod malous users n the network ust by hangng the method of estmaton of a and b. Referenes [] M. Feldman and J. Chuang, Overomng free-rdng behavor n peer-to-peer systems, SIGeom Exh., vol. 5, no. 4, pp. 4 50, Jul [Onlne]. Avalable: [2] M. Karakaya, I. Korpeoglu, and O. Ulusoy, Free rdng n peerto-peer networks, IEEE Internet Computng, vol. 3, no. 2, pp , [3] B. Yang, T. Conde, S. D. Kamvar, and H. Gara-Molna, on-ooperaton n ompettve p2p networks. n ICDCS. IEEE Computer Soety, 2005, pp [Onlne]. Avalable: [4] M. J. Osborne, Introduton to Game Theory: Internatonal Edton. Oxford Unversty Press, [Onlne]. Avalable: [5] Y. Tang, H. Wang, and W. Dou, Trust based nentve n p2p network, n Proeedngs of the E-Commere Tehnology for Dynam E-Busness, IEEE Internatonal Conferene, ser. CEC-EAST 04. Washngton, DC, USA: IEEE Computer Soety, 2004, pp [Onlne]. Avalable: [6] E. Adar and B. A. Huberman, Free rdng on gnutella, Frst Monday, vol. 5, p. 2000, [7] D. Hughes, G. Coulson, and J. Walkerdne, Free rdng on gnutella revsted: The bell tolls? IEEE Dstrbuted Systems Onlne, vol. 6, no. 6, pp., Jun [Onlne]. Avalable: [8] K. Chen, K. Hwang, and G. Chen, Heurst dsovery of rolebased trust hans n peer-to-peer networks, IEEE Transatons on Parallel and Dstrbuted Systems, vol. 20, no., pp , [9] E. Daman, S. De Captan D Vmerat, S. Parabosh, and P. Samarat, Managng and sharng servants reputatons n p2p systems, Knowledge and Data Engneerng, IEEE Transatons on, vol. 5, no. 4, pp , [0] [] A.-L. Barabás and R. Albert, Emergene of Salng n Random etworks, Sene, vol. 286, no. 5439, pp , Ot [Onlne]. Avalable: [2] B. Bollobás, O. Rordan, J. Spener, and G. Tusnády, The degree sequene of a sale-free random graph proess, Random Strut. Algorthms, vol. 8, no. 3, pp , May 200. [Onlne]. Avalable: [3] S. D. Kamvar, M. T. Shlosser, and H. Gara-Molna, The egentrust algorthm for reputaton management n p2p networks, n Proeedngs of the 2th nternatonal onferene on World Wde Web, ser. WWW 03. ew York, Y, USA: ACM, 2003, pp [Onlne]. Avalable: [4] L. Xong and L. Lu, Peertrust: Supportng reputaton-based trust for peer-to-peer eletron ommuntes, IEEE Trans. on Knowl. and Data Eng., vol. 6, no. 7, pp , Jul [Onlne]. Avalable: [5] S. Song, K. Hwang, R. Zhou, and Y.-K. Kwok, Trusted p2p transatons wth fuzzy reputaton aggregaton, IEEE Internet Computng, vol. 9, no. 6, pp , ov [Onlne]. Avalable: [6] R. Zhou and K. Hwang, Powertrust: A robust and salable reputaton system for trusted peer-to-peer omputng, IEEE Trans. Parallel Dstrb. Syst., vol. 8, no. 4, pp , Apr [Onlne]. Avalable: [7] R. Zhou, K. Hwang, and M. Ca, Gossptrust for fast reputaton aggregaton n peer-to-peer networks, IEEE Transatons on Knowledge and Data Engneerng, vol. 20, no. 9, pp , [8] Z. Lang and W. Sh, Pet: A personalzed trust model wth reputaton and rsk evaluaton for p2p resoure sharng, n Proeedngs of the Proeedngs of the 38th Annual Hawa Internatonal Conferene on System Senes - Volume 07, ser. HICSS 05. Washngton, DC, USA: IEEE Computer Soety, 2005, pp [Onlne]. Avalable: [9] S. Sarou, P. Gummad, and S. Grbble, A Measurement Study of Peer-to-Peer Fle Sharng Systems, [Onlne]. Avalable: [20] R. Gupta and Y.. Sngh, Trust estmaton n peer-to-peer network usng blue, CoRR, vol. abs/ , 203. [2] D. Kempe, A. Dobra, and J. Gehrke, Gossp-based

12 2 omputaton of aggregate nformaton, n Proeedngs of the 44th Annual IEEE Symposum on Foundatons of Computer Sene, ser. FOCS 03. Washngton, DC, USA: IEEE Computer Soety, 2003, pp [Onlne]. Avalable: [22] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, Randomzed gossp algorthms, IEEE/ACM Trans. etw., vol. 4, no. SI, pp , Jun [Onlne]. Avalable: [23] D. Group, Gnutella: To the bandwdth barrer and beyond, [24] H. Chen, H. Jn, J. Sun, D. Deng, and X. Lao, Analyss of largesale topologal propertes for peer-to-peer networks, n Cluster Computng and the Grd, CCGrd IEEE Internatonal Symposum on, 2004, pp [25] F. Cherhett, S. Lattanz, and A. Panones, Rumor spreadng n soal networks, Theor. Comput. S., vol. 42, no. 24, pp , 20. [26] U. Fege, D. Peleg, P. Raghavan, and E. Upfal, Randomzed broadast n networks. Random Strut. Algorthms, vol., no. 4, pp , 990. [27] G. Grmmett and D. Welsh, Probablty: An Introduton, 986. Appendx proof of theorem 5.2 We an see the property of mass onservaton proposton A.) [2] holds n ths ase as well. Proposton A.. Under the dfferental Push protool wth Unform Gossp, the sum of all of th node s ontrbutons at all nodes s m and hene the sum of all weghts s n,, g m Proof of theorem 5.2: As we know when a node wll get equal ontrbuton from every node t wll reah the average value. Takng varane around the mean value of the ontrbutons from all the nodes at a partular node wll gve the level of onvergene at one node. If we sum these varanes for all the nodes, we wll get the dea about the onvergene of network. We are ust referrng to reputaton of node m n ths proof, and super srpt m have not been expltly shown. It means m n n and g m n g n. The varane at node wll be E n,, n,, ) 2.e. n,, g )2. As ths quantty s small, we an drop. Ths wll stll gve the dea about the onvergene. Further addng the varane at all the nodes gves us the dea about further onvergene n the whole network. We all ths as potental funtonψ n ψ n n,, g ) 2 9), Let us studyψfor p-push gossp,.e. when every node s makng p pushes to p nodes. Here we are assumng that node hooses every node nludng tself for push ndependently. Here fk) means that a node k hooses a node and pushes gossp par. The d and g are dvded by p); one part s always retaned by the node and remanng are used for p push. n,, p n,, n,,k. 20) p k: f k) g n,, 2) As ψ n p n,, p p g p k: f k) g k: f k) n,,k n,, g ) 2, 22), substtutng the values of n,, and g, we get ψ n n,, g ) n,,k g ) 2 p p, k: f k) p) 2 n,, g ) 2, p) 2 n,,k g ) 2, k: f k) 2 p) 2 n,, g ) n,,k g ), k: f k) p) 2 n,,k g ), ˆk k: f k) f ˆk),k ˆk g ) n,ˆk,ˆk. In seond term of the prevous equaton, we are dong summaton over, and k : f k). Eah node k s ontrbutng p opes to ts p neghbors. If ths ontrbuton s summed over k, t should be equal to ontrbuton reeved by eah node when summed over all nodes. Thus p n,,k g )2 n,,k g )2 23). k ψ n k: f k) p) 2 n,, g ) 2 p p) 2 n,, g,, 2 p) 2 n,, g ) n,,k g ), k: f k) 2 p) 2 n,,k g ) g ) n,ˆk,ˆk, ˆk, k ˆk: f k) f ˆk) p) ψ 2 n p) 2 n,, g ) n,,k g,,k: f k) n,,k g ) k: f k) f ˆk),ˆk k ) 2 p) 2 n,,ˆk g n,ˆk ). ) 2

13 3 We know that node wll hoose a node randomly among ts neghbours. Let us assume that the degree of sad node k s d k wth probablty P dk. Out of remanng nodes, we an form group of d k nodes n ) d k ways. If we fx one node say as one of the neghbour, then there are 2 C dk ) ways of havng other dk neghbours. Thus the probablty of beng a neghbour of a node k havng degree d k wll 2 d k ). Further the probablty that k wll d k ) hoose wll be d k. P[ f k) ] P[ˆk k, f k) f ˆk) ] ) 2 d k d k P dk ) P dk 24) Smlarly 25) P dk P dˆk 26) The P dk s the probablty that a node has degree d k. For networks generated by PA Model, d k Let us assume that the maxmum value of P d s P dmax and mnmum value s P dmn and the dfferene of P dmax and P dmn s K, then E[ψ n ψ n ] p ψ n 2 p) 2 ) n,,k g ) P dk k p) 2 ) 2 k g n,ˆk n,,ˆkp dmax P d mn ˆk ˆk p) 2 ) 2,k n,, g n,,k P dmax n,,k g k ) 2 P 2 d mn g P d mn ˆk Pd k ) d γ k. Here γ s network exponent. Hene, E[ψ n ψ n ] p) ψ 2 n p) 2 n,, g ),k, n,,k g ) P[ f k) ] 2 p) 2 n,,k g ), ˆk k:ˆk k g ) n,ˆk n,,ˆk P[ˆk k, f k) f ˆk) ] p ψ 2 n p) 2 n,, g ),k, n,,k g ) P dk p) 2 n,,k g ) g ) n,ˆk n,,ˆk k P dk P dˆk p) 2 n,,k g ) 2 P 2 d k ) 2 In the last lne we use the fat that p ψ 2 n p) 2 ) n,, g ) n,,k g k p) 2 ) 2 n,,k g k g ) n,ˆk n,,ˆk P dˆk ˆk,k p) 2 ) 2 k, n,,k g ) P dk ) 2 P 2 d k ) P dk Applyng mass onservaton g n,,, n,,k, and k wll be equal to, so the seond term wll beome k g zero and thrd term wll beome K 2. Fourth term s always non negatve so removng ths term wll not affet the bound. So E[ψ n ψ n ] p ψ n p) 2 ) 2 2 K 2 p) 2 ) 2 P2 d k n,,k g K 2 2 k, p ψ n p) 2 ) 2 p) 2 ) 2 P2 d mn ψ n p ψ n K 2 2 p) 2 ) 2 ) 2 p) 2 ) 2 P 2 d mn ψ n wll always reman non negatve. We know that d mn s 2. If we onsder the value ofγto be 2, maxmum value of K 2 wll be 6 onsderng P d max to be zero and the maxmum possble value of 2 ) 2 s 4. Thus, E[ψ n ψ n ] p ψ n 4 p) 2. 27) ow we wll alulate the value ofψ 0. We know that ntally the ontrbuton vetor ontans only sngle non-zero value.e. ontrbuton reeved from t self and

14 4 that value s, rest all elements are 0. So ψ 0 0,, g ) 2 0,, [ 0,, g ) 0, 2 0,2, g ) 0, ,, g ) 0, ,, g ) 0, 2 ] [ 0 ) 2 0 ) 2... ) ) 2 ] [ 2 2 ) ] 2 [ ] 28) ow we wll substtute the value ofψ 0 n 27). Ths wll gve us the bound onψ n E[ψ ψ 0 ] p ψ 0 29) 4 p) 2 E[ψ ] p ) 4 p) 2 Smlarly 30) E[ψ 2 ] p p ) 4 p) ) 2 E[ψ n ] 6 p) 2 p) 2 6p) 3 4p) 2 p) n 6p) n 4p) n... 4p) 2 ) p) n 4pp ) n ) p) n 4 p)p 4 p)p It an be seen that rght hand sde of the above equaton s maxmum when p. It means potental funton s deayng at the slowest rate for p. So tme taken n onvergene for p wll be maxmum. For normal push, algorthm wll at as upper bound for dfferental push algorthm.e. ombnaton of dfferent values of postve nteger p s. So takng p; E[ψ n ] ) 2 n 8 ) 2 n k d 3) Here k d s an nteger onstant that s greater than the rato of maxmum value of ) 2 n and 8. Ths an be seen that k d wll depend on the number of steps requred for onvergene. After gosspng for nlog 2 )log 2 k d log 2 ξ steps, E[ψ n ] ) 2 log 2 )) 2 log 2k d )) 2 log 2/ξ)) k d E[ψ n ] ξ 32) n,, g ) 2 ξ, If summaton of some non-negatve numbers are less thanξthen ndvdually eah number must be less than ξ,.e. n,, g ξ 2 for all nodes. If we onsder weght as an nformaton to be spread among the nodes, aordng to theorem 5., nformaton wll reah to all the nodes n a power law network wth hgh probablty, n n log 2 ) 2 rounds. After these n rounds every node wll reeve at least 2 n weght. So applyng unon bound [27] over weght spreadng and potental deay event We have seen potental s deayng at every step) and dvdng wth g gves n,, g ξ at steps Olog 2) 2 log 2 log 2 k d log 2 ξ ).e. wthn Olog 2 ) 2 log ξ ) steps wth hgh probablty.

Use of Multi-attribute Utility Functions in Evaluating Security Systems

Use of Multi-attribute Utility Functions in Evaluating Security Systems LLNL-TR-405048 Use of Mult-attrbute Utlty Funtons n Evaluatng Seurty Systems C. Meyers, A. Lamont, A. Sherman June 30, 2008 Ths doument was prepared as an aount of work sponsored by an ageny of the Unted

More information

Data Analysis with Fuzzy Measure on Intuitionistic Fuzzy Sets

Data Analysis with Fuzzy Measure on Intuitionistic Fuzzy Sets Proeedngs of the Internatonal MultConferene of Engneers and Computer Sentsts 2016 Vol II Marh 16-18 2016 Hong Kong Data nalyss wth Fuzzy Measure on Intutonst Fuzzy Sets Sanghyuk Lee * Ka Lok Man Eng Gee

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

24. Impact of Piracy on Innovation at Software Firms and Implications for Piracy Policy

24. Impact of Piracy on Innovation at Software Firms and Implications for Piracy Policy 4. mpat of Pray on nnovaton at Software Frms and mplatons for Pray Poly Jeevan Jasngh Department of nformaton & Systems Management, HKUST Clear Water Bay, Kowloon Hong Kong jeevan@ust.h Abstrat A Busness

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Lognormal random eld approxmatons to LIBOR market models O. Kurbanmuradov K. Sabelfeld y J. Shoenmakers z Mathemats Subet Classaton: 60H10,65C05,90A09 Keywords: LIBOR nterest rate models, random eld smulaton,

More information

Optimal Adaptive Voice Smoother with Lagrangian Multiplier Method for VoIP Service

Optimal Adaptive Voice Smoother with Lagrangian Multiplier Method for VoIP Service Optmal Adaptve Voe Smoother wth Lagrangan Multpler Method for VoIP Serve Shyh-Fang HUANG, Er Hsao-uang WU and Pao-Ch CHANG Dept of Eletral Engneerng, Computer Sene and Informaton Engneerng and Communaton

More information

Series Solutions of ODEs 2 the Frobenius method. The basic idea of the Frobenius method is to look for solutions of the form 3

Series Solutions of ODEs 2 the Frobenius method. The basic idea of the Frobenius method is to look for solutions of the form 3 Royal Holloway Unversty of London Department of Physs Seres Solutons of ODEs the Frobenus method Introduton to the Methodology The smple seres expanson method works for dfferental equatons whose solutons

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

When can bundling help adoption of network technologies or services?

When can bundling help adoption of network technologies or services? When an bundlng help adopton of network tehnologes or serves? Steven Weber Dept. of ECE, Drexel U. sweber@oe.drexel.edu Roh Guérn Dept. of CSE, WUSTL guern@wustl.edu Jaudele C. de Olvera Dept. of ECE,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

CONSIDER a connected network of n nodes that all wish

CONSIDER a connected network of n nodes that all wish 36 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 2, FEBRUARY 204 Coded Cooperatve Data Exhange n Multhop Networks Thomas A. Courtade, Member, IEEE, and Rhard D. Wesel, Senor Member, IEEE Abstrat

More information

Evaluation of Delay Performance in Valiant Load-balancing Network

Evaluation of Delay Performance in Valiant Load-balancing Network Evaluaton of Delay Performane n Valant Load-balanng Network Yngd Yu a, Yaohu Jn a, Hong Cheng a, Yu Gao a, Weqang Sun a, We Guo a, Wesheng Hu a a State Key Laboratory on Fber-Ot Loal Area Networks and

More information

Energy-Efficient Design in Wireless OFDMA

Energy-Efficient Design in Wireless OFDMA Ths full text paper was peer revewed at the dreton of IEEE Communatons Soety subjet matter experts for publaton n the ICC 2008 proeedngs. Energy-Effent Desgn n Wreless OFDMA Guowang Mao, Nageen Hmayat,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Figure 1. Inventory Level vs. Time - EOQ Problem

Figure 1. Inventory Level vs. Time - EOQ Problem IEOR 54 Sprng, 009 rof Leahman otes on Eonom Lot Shedulng and Eonom Rotaton Cyles he Eonom Order Quantty (EOQ) Consder an nventory tem n solaton wth demand rate, holdng ost h per unt per unt tme, and replenshment

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Partner Choice and the Marital College Premium: Analyzing Marital Patterns Over Several Decades

Partner Choice and the Marital College Premium: Analyzing Marital Patterns Over Several Decades Partner Choe and the Martal College Premum: Analyzng Martal Patterns Over Several Deades Perre-André Chappor Bernard Salané Yoram Wess January 31, 2015 Abstrat We onstrut a strutural model of household

More information

Multi-settlement Systems for Electricity Markets: Zonal Aggregation under Network Uncertainty and Market Power 1

Multi-settlement Systems for Electricity Markets: Zonal Aggregation under Network Uncertainty and Market Power 1 Proeedngs of the 35th Hawa Internatonal Conferene on System Senes - 2002 Mult-settlement Systems for Eletrty Markets: Zonal Aggregaton under Network Unertanty and Market Power 1 Ransh Kamat and Shmuel

More information

Modern Problem Solving Techniques in Engineering with POLYMATH, Excel and MATLAB. Introduction

Modern Problem Solving Techniques in Engineering with POLYMATH, Excel and MATLAB. Introduction Modern Problem Solvng Tehnques n Engneerng wth POLYMATH, Exel and MATLAB. Introduton Engneers are fundamentally problem solvers, seekng to aheve some objetve or desgn among tehnal, soal eonom, regulatory

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Cyber-Security Via Computing With Words

Cyber-Security Via Computing With Words Cyber-Seurty Va Computng Wth Words John. Rkard Dstrbuted Infnty, In. 4637 Shoshone Drve Larkspur, CO 808 Emal: trkard@dstrbutednfnty.om ABSRAC Cyber-seurty systems must deal wth a hgh rate of observable

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information

DECOMPOSITION ALGORITHM FOR OPTIMAL SECURITY-CONSTRAINED POWER SCHEDULING

DECOMPOSITION ALGORITHM FOR OPTIMAL SECURITY-CONSTRAINED POWER SCHEDULING DECOMPOSITION ALGORITHM FOR OPTIMAL SECURITY-CONSTRAINED POWER SCHEDULING Jorge Martínez-Crespo Julo Usaola José L. Fernández Unversdad Carlos III de Madrd Unversdad Carlos III de Madrd Red Elétra de Espana

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT

AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT 1 AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT Nkos Salamanos, Ev Alexogann, Mchals Vazrganns Department of Informatcs, Athens Unversty of Economcs and Busness salaman@aueb.gr,

More information

Optimal Health Insurance for Multiple Goods and Time Periods

Optimal Health Insurance for Multiple Goods and Time Periods 04 R.P. Ells, S. Jang, and W.G. Mannng Optmal Health Insurane for Multple Goods and Tme Perods Randall P. Ells a,, Sheny Jang b, Wllard G. Mannng a Department of Eonoms, Boston Unversty, 70 Bay State Road,

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

A GRID BASED VIRTUAL REACTOR: PARALLEL PERFORMANCE AND ADAPTIVE LOAD BALANCING

A GRID BASED VIRTUAL REACTOR: PARALLEL PERFORMANCE AND ADAPTIVE LOAD BALANCING A GRID BASED VIRTUAL REACTOR: PARALLEL PERFORMANCE AND ADAPTIVE LOAD BALANCING Vladmr V. Korkhov 1,2, Valera V. Krzhzhanovskaya 1,2 and P.M.A. Sloot 1 {vkorkhov valera sloot}@sene.uva.nl 1 Unversty of

More information

Hgh Dmensonal Data Analysis proposeations

Hgh Dmensonal Data Analysis proposeations Yuntao Qan, Xaoxu Du, and Q Wang Sem-supervsed Herarhal Clusterng Analyss for Hgh Dmensonal Data Sem-supervsed Herarhal Clusterng Analyss for Hgh Dmensonal Data Yuntao Qan, Xaoxu Du, and Q Wang College

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Economy-based Content Replication for Peering Content Delivery Networks

Economy-based Content Replication for Peering Content Delivery Networks Eonomy-based Content Replaton for Peerng Content Delvery Networs Al-Muaddm Khan Pathan 1 and Raumar Buyya Grd Computng and Dstrbuted Systems (GRIDS) Laboratory Department of Computer Sene and Software

More information

Chapter 6. Demand Relationships Among Goods

Chapter 6. Demand Relationships Among Goods Chapter 6 Demand Relatonshps Among Goods Up to ths pont, we have held the pre of other goods onstant. Now we onsder how hanges n p affet n a two-good world. I p I p I p I p p p ( ) ( ) then I p then (

More information

Behavior Coordination in E-commerce Supply Chains

Behavior Coordination in E-commerce Supply Chains Assoaton for Informaton ystems AI Eletron Lbrary AIeL) WHICEB 25 Proeedngs Wuhan Internatonal Conferene on e-busness ummer 6-9-25 Behavor Coordnaton n E-ommere upply Chans Yanhong Zhang Insttute of system

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

Multi-class kernel logistic regression: a fixed-size implementation

Multi-class kernel logistic regression: a fixed-size implementation Mult-lass kernel logst regresson: a fxed-sze mplementaton Peter Karsmakers,2, Krstaan Pelkmans 2, Johan AK Suykens 2 Abstrat Ths researh studes a pratal teratve algorthm for mult-lass kernel logst regresson

More information

Analysis of Premium Liabilities for Australian Lines of Business

Analysis of Premium Liabilities for Australian Lines of Business Summary of Analyss of Premum Labltes for Australan Lnes of Busness Emly Tao Honours Research Paper, The Unversty of Melbourne Emly Tao Acknowledgements I am grateful to the Australan Prudental Regulaton

More information

Applications of the Offset in Property-Casualty Predictive Modeling

Applications of the Offset in Property-Casualty Predictive Modeling Applatons of the Offset n Property-Casualty Predtve Modelng Jun Yan, Ph.D. James Guszza, FCAS, MAAA, Ph.D. Matthew Flynn, Ph.D. Cheng-Sheng Peter Wu, FCAS, ASA, MAAA Abstrat: Generalzed Lnear Model [GLM]

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

1. Math 210 Finite Mathematics

1. Math 210 Finite Mathematics 1. ath 210 Fnte athematcs Chapter 5.2 and 5.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210

More information

North-South Trade-Related Technology Diffusion: Virtuous Growth Cycles in Latin America

North-South Trade-Related Technology Diffusion: Virtuous Growth Cycles in Latin America DISCUSSION PAPER SERIES IZA DP No. 4943 North-South Trade-Related Tehnology Dffuson: Vrtuous Growth Cyles n Latn Amera Maure Shff Yanlng Wang May 2010 Forshungsnsttut zur Zukunft der Arbet Insttute for

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

The Application of Qubit Neural Networks for Time Series Forecasting with Automatic Phase Adjustment Mechanism

The Application of Qubit Neural Networks for Time Series Forecasting with Automatic Phase Adjustment Mechanism The Applaton of Qubt Neural Networks for Tme Seres Foreastng wth Automat Phase Adjustment Mehansm arlos R. B. Azevedo 1 and Tago. A. E. Ferrera 1 1 entro de ênas e Tenologa Unversdade atóla de Pernambuo

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

Pricing System Security in Electricity Markets. latter might lead to high prices as a result of unrealistic

Pricing System Security in Electricity Markets. latter might lead to high prices as a result of unrealistic 1 Pro. Bulk Power Systems Dynams and Control{V, Onomh, Japan, August 2001. Prng System Seurty n Eletrty Markets Claudo A. Ca~nzares Hong Chen Wllam Rosehart UnverstyofWaterloo Unversty of Calgary Dept.

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

FINANCIAL MATHEMATICS

FINANCIAL MATHEMATICS 3 LESSON FINANCIAL MATHEMATICS Annutes What s an annuty? The term annuty s used n fnancal mathematcs to refer to any termnatng sequence of regular fxed payments over a specfed perod of tme. Loans are usually

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees

Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees Vulnerablty Assessment of Cyberseurty for SCADA Systems Usng Attak Trees Chee-Woo Ten, Student Member, IEEE, Chen-Chng Lu, Fellow, IEEE, Manmaran ovndarasu, Member, IEEE Abstrat By penetratng the SCADA

More information

Thursday, December 10, 2009 Noon - 1:50 pm Faraday 143

Thursday, December 10, 2009 Noon - 1:50 pm Faraday 143 1. ath 210 Fnte athematcs Chapter 5.2 and 4.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210

More information

The EigenTrust Algorithm for Reputation Management in P2P Networks

The EigenTrust Algorithm for Reputation Management in P2P Networks The EgenTrust Algorthm for Reputaton Management n P2P Networks Sepandar D. Kamvar Stanford Unversty sdkamvar@stanford.edu Maro T. Schlosser Stanford Unversty schloss@db.stanford.edu Hector Garca-Molna

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Modeling and Analysis of 2D Service Differentiation on e-commerce Servers

Modeling and Analysis of 2D Service Differentiation on e-commerce Servers Modelng and Analyss of D Servce Dfferentaton on e-commerce Servers Xaobo Zhou, Unversty of Colorado, Colorado Sprng, CO zbo@cs.uccs.edu Janbn We and Cheng-Zhong Xu Wayne State Unversty, Detrot, Mchgan

More information

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

Finite Math Chapter 10: Study Guide and Solution to Problems

Finite Math Chapter 10: Study Guide and Solution to Problems Fnte Math Chapter 10: Study Gude and Soluton to Problems Basc Formulas and Concepts 10.1 Interest Basc Concepts Interest A fee a bank pays you for money you depost nto a savngs account. Prncpal P The amount

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

A Probabilistic Theory of Coherence

A Probabilistic Theory of Coherence A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

1. Measuring association using correlation and regression

1. Measuring association using correlation and regression How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

Quantization Effects in Digital Filters

Quantization Effects in Digital Filters Quantzaton Effects n Dgtal Flters Dstrbuton of Truncaton Errors In two's complement representaton an exact number would have nfntely many bts (n general). When we lmt the number of bts to some fnte value

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR 8S CHAPTER 8 EXAMPLES EXAMPLE 8.4A THE INVESTMENT NEEDED TO REACH A PARTICULAR FUTURE VALUE What amount must you nvest now at 4% compoune monthly

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

The Load Balancing of Database Allocation in the Cloud

The Load Balancing of Database Allocation in the Cloud , March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information