Minimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games

Size: px
Start display at page:

Download "Minimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games"

Transcription

1 Minimum Support Size o the Deender s Strong Stackeberg Equiibrium Strategies in Security Games Jiarui Gan University o Chinese Academy o Sciences The Key Lab o Inteigent Inormation Processing, ICT, CAS Beijing , China ganjr@ics.ict.ac.cn Bo An Nanyang Technoogica University Singapore boan@ntu.edu.sg Abstract Stackeberg security games have been appied to address chaenges in security resource aocation o reaword inrastructure protection tasks. The key to such an appication is to eicienty compute the deender s optima strategy in consideration o the attacker s surveiance capabiity and best response. Experimenta resuts show that the deender s optima strategy oten uses ony a sma subset o pure strategies, as compared with the entire pure strategy set which can be exponentiay arge. A number o agorithms in the iterature have aready expoited this sma support size observation. This paper anayzes a number o widey studied security games and provides bounds on the minimum support size o the deender s Strong Stackeberg Equiibrium SSE strategies in security games. Introduction Stackeberg security games have been used to mode many rea-word scenarios where a deender commits to a strategy and an attacker makes its attacking decision with knowedge o the deender s commitment. Systems appying Stackeberg game modes to assist with randomized resource aocation decisions have been deveoped and are currenty in use, such as: ARMOR, deveoped at the Los Angees Internationa Airport LAX to randomize checkpoints on the roadways entering the airport and canine patro routes within the airport terminas Pita et a. 2008; IRIS, used by the Federa Air Marshas Service FAMS as a scheduer or randomized depoyment Tsai et a. 2009; PROTECT, used by the US Coast Guard USCG to randomize patroing at the port o Boston Shieh et a. 2012; and GUARDS, used by the United States Transportation Security Administration T- SA to scheduing resources to protect airports in the USA An et a. 2011b; Pita et a The core o the above appications is computing o the deender s optima strategy, where diicuty ies in the arge scae o the deender s strategy space. Speciicay, a deender pays a mixed strategy which is a probabiistic distribution over a set o pure strategies. The pure strategy set can be very arge due to combinatoria exposion. For exampe, in a security game where the deender aocates securi- Copyright c 2013, Association or the Advancement o Artiicia Inteigence A rights reserved. ty resources to cover a set o n targets, the deender coud have 2 n pure strategies. How to optimize the deender s s- trategy over such a arge scae pure strategy space is thus a big chaenge. Athough agorithms have been designed to speed up the computing process or to scae up the mode Paruchuri et a. 2008; Kiekintved et a. 2009; Jain et a. 2010; Korzhyk, Conitzer, and Parr 2010; An et a. 2011c; Jain et a it sti remains as an open research area to design more eicient agorithms to dea with scaabiity and uncertainty An et a. 2011a; 2012; Brown et a. 2012; Yang, Ordonez, and Tambe 2012; Yin and Tambe 2012; An et a It has been noticed that ony pure strategies with non-zero probabiities in a mixed strategy contribute to the impementation o the mixed strategy whie the others are unused. We ca the set o pure strategies with non-zero probabiities the support o the mixed strategy. Experimenta resuts show that the deender s optima strategy oten has a sma support, as compared with the entire pure strategy set which can be exponentiay arge Shieh et a A number o agorithms in the iterature have aready expoited this sma support size observation, and particuary avoided enumerating the entire set o pure strategies whie computing the deender s optima strategy. For exampe, a coumn generation method adds one best pure strategy into the support each time, unti the soution cannot be improved e.g., Jain et a. 2010; and a doube-orace based approach Jain et a. 2011; Jain, Conitzer, and Tambe 2013, where the payers pay a series o games iterativey using a subset o pure strategies unti convergence. One interesting question ies behind these appications that is yet not answered to the best o our knowedge is how sma the support o the deender s optima strategy can be. To answer the above question, this paper anayzes the structure o the deender s strategy in a number o widey s- tudied security games and provides bounds on the minimum support size o the deender s Strong Stackeberg Equiibrium SSE strategies in security games. The rest o the paper is organized as oows. We irst introduce the Stackeberg game and Stackeberg equiibria. Then starting with a typica Stackeberg security game which can be compacty represented, we present the bound o the minimum support size o the deender s SSE strategies or a genera Stackeberg game and, more generay, or a Bayesian Stackeberg game

2 which aows or mutipe types o attackers. In the end, we appy the bound to other types o speciaized Stackeberg security games. Stackebeg Games and Equiibria A Stackeberg game is payed by two payers: a eader and a oower. The eader acts irst and the oower observes the eader s strategy beore taking an action. Each payer has a set o pure strategies, denoted as S and T or the eader and the oower, respectivey. Let s j be the j th pure strategy in S and t i be the i th pure strategy in T. When the eader pays s j and the oower pays t i, they receive payos U j,i and, respectivey. Furthermore, the eader commits a mixed U j,i strategy x = x j which is a probabiistic distribution over the set S o pure strategies. Simiary, the attacker commits a mixed strategy y = y i. In this case, the expected payo or the eader and the oower are deined respectivey as oows: U x, y = T y i i=1 U x, y = T y i i=1 x j U j,i 1 x j U j,i 2 Stackeberg Equiibria In a Stackeberg equiibrium, the oower observes the eader s strategy x and responds with strategy x : x y that is optima with respect to his expected payo, i.e., U x, x U x, y or a other easibe strategies y; the eader, knowing the payo-driven behavior o the oower, chooses an optima strategy x that maximizes his payo, i.e., U x, x U x, x or a other easibe strategies x. Typicay, there might be more than one optima strategy or the oower, and each o these strategies may induce a dierent payo or the eader. Two types o Stackeberg equiibrium, the Strong Stackeberg Equiibrium SSE and the Weak Stackeberg Equiibrium WSE, were introduced Leitmann 1978; Breton, Aj, and Haurie 1988, where SSE assumes the oower breaks ties in avor o the deender and chooses the one that is optima or the eader, whie WSE assumes that the oower chooses the worst one or the eader. Most exiting work takes SSE as the soution concept as most iteratures in this research ied did, since 1 SSE exists in a Stackeberg games, whie WSE may not Basar et a. 1995; 2 SSE can aways be induced by the eader through deviating ininitesima rom the optima strategy Von Stenge and Zamir Deinition 1. A pair o strategies x, x orms a Strong Stackeberg Equiibrium SSE i it satisies the oowing: 1. The eader pays a best-response: U x, x U x, x, or a the eader strategies x. 2. The oower pays a best-response: U x, x U x, y, or a the oower strategies y. 3. The oower breaks ties in avor o the eader: U x, x U x, y, or a optima oower strategies y. Speciay, we restrict the attacker s strategy to pure strategies, i.e., x : x t, t T, because according to E- q. 2 i one mixed strategy is optima or the attacker, then a the pure strategies with non-zero probabiities shoud be optima, so that the attacker aways has a best pure-strategy response. It oows that the payo unctions deined in E- qs. 1 and 2 can be rewritten as assuming the attacker attacks t i : U x, t i = x j U ji, 3 U x, t i = x j U ji. 4 Bound the Minimum Support Size o the Leader s SSE Strategies In this section, we expoit the structure o a eader strategy and presents an upper bound on the size o the minimum support deined beow o the eader s SSE strategies. For ease o description, we use Φ to represent the upper bound on the minimum support size o the eader s SSE strategies. Denote x as the support size o a mixed strategy x, we have min x Φ, x X where X is the set o eader s SSE strategies. In other words, the eader aways has an SSE strategy that can be impemented by no more than Φ pure strategies. Deinition 2. A pure strategy is a support strategy o a mixed strategy i it is assigned with a non-zero probabiity by this mixed strategy. The set o a support strategies is caed the support o the mixed strategy. We start rom a specia Stackeberg security game mode presented beow, where a eader s strategy can be represented compacty as a coverage vector, since it provides an easyto-oow exampe o how arge the pure strategy set coud be and how tight the support coud be bounded. We ca this game mode compact game mode so as to distinguish it rom other types o Stackeberg security games. Then with a simiar idea that Φ or a compact game is obtained, we generaize it and present Φ or a genera Stackeberg game and urthermore a Bayesian Stackeberg game. Compact Game Mode The compact game mode appies to many security domains e.g., Pita et a. 2008; Tsai et a In this game mode, the eader is a deender who protects a set o targets, and the oower is an attacker who wants to attack a target. Let the set o targets be 1,..., n. The deender aocates security resources to protect the targets, and his pure strategy is an aocation o the recourses. Typicay, in the compact game mode, a target is either covered or uncovered by security resources, and when it is covered, adding more resources to

3 it makes no dierence. In this case, a rationa deender assigns at most one resource to a target, and a pure strategy o the deender can thus be deined as a 0/1 coverage vector with the j th pure strategy s j = s ji {0, 1} n, where s ji = 1 represents that target i is covered and s ji = 0 uncovered. Correspondingy, the attacker s pure strategy is to choose one target to attack. Let t i be the attacker s pure s- trategy o attacking target i. When the attacker pays t i and target i is uncovered, he receives utiity U 0 at i, and the deender receives utiity U 0 d t i. Simiary, when the attacker pays t i and target i is covered, he receives utiity U 1 at i, and the deender receives U 1 d t i. It oows that when the deender pays a mixed strategy x, the targets are covered with probabiities cx = c i = s j S x js j with c i or target i, and are uncovered with 1 c. We reer to c as the coverage vector. For a strategy proie x, t i, the expected utiity or the deender and the attacker can be deined respectivey as oows: U d c, ti = ci U 1 d t i + 1 c i U 0 d t i, 5 U a c, ti = ci U 1 at i + 1 c i U 0 a t i. 6 Generay, some resource restrictions, such as scheduing constraints, can be enorced on the deender s pure strategy set S. However, even i in the presence o such restrictions, the size o S may sti be exponentiay arge in terms o the number o targets. For exampe, when there are m avaiabe resources, the size o S is at east n m. Φ or a Compact Game According to Eqs. 5 and 6, t- wo deender strategies x 1 and x 2 resuts in the same attacker response and moreover the same utiity or each payer, i they induce the same coverage vector, i.e., cx 1 = cx 2. We utiize this observation to seek equivaent deender s- trategies with smaer supports. For exampe, when there are three targets and the deender pays a mixed strategy where pure strategies 1, 0, 0, 1, 1, 0, 0, 1, 0 and 0, 1, 1 are assigned with probabiities 0.25 or each, a coverage vector 0.5, 0.5, 0.5 is induced. In this case, it is aso possibe to use ony pure strategies 1, 0, 0 and 0, 1, 1 with probabiity 0.5 or each and a the others with probabiity 0, which induces the same coverage vector. In act, a deender strategy irst induces a coverage vector and then aects the game through this coverage vector. Thereore, rather than speciying an exact mixed strategy, the deender coud irst cacuate an optima coverage vector that is impementabe by his easibe mixed strategies, i.e., c P = x j s j x 0, 1T x = 1, such that s j S U d c, c U d c, c, c P, and then impement c with a mixed strategy which is optima or the deender in this case. Note that the impementabe coverage vector set P is a convex hu in an n- dimensiona space deined by points in S. According to the Carathéodory s theorem Danninger-Uchida 2001, any Figure 1: Carathéodory s theorem: in a pane i.e., a 2- dimensiona space, any point x in a convex hu aso ies in a 2-simpex. point, in particuar c, in the convex hu ies in an r-simpex with vertices in S, where r n, and any point in the r- simpex can be represented as a convex combination o the r + 1 vertices o the simpex. Thereore, c can aways be impemented by no more than n + 1 pure strategies corresponding to the vertices o the simpex where c ies in, and an upper bound Φ = n+1 is obtained or the compact game mode Coroary 2. Theorem 1 Carathéodory s theorem Danninger-Uchida I a point x R d ies in the convex hu o a point set P, there is a subset P o P consisting o d + 1 or ewer points such that x ies in the convex hu o P, i.e., x ies in an r-simpex with vertices in P, where r d Figure 1. Coroary 2. The minimum support size o the deender s SSE strategies in a compact game is n + 1, where n is the number o targets. Φ or a Genera Stackeberg Game The compact game mode is a specia case o Stackeberg security games. In other appication o Stackeberg game modes, the deender s strategies over the targets may be more compex than being simpy either covering or not covering. For exampe, in some rea-word scenarios, it makes a dierence when dierent number or dierent types o security resources are assigned to a target Pita et a. 2011; Shieh et a. 2012; and in a network-based game Washburn and Wood 1995; Tsai et a. 2010; Jain et a. 2011; Jain, Conitzer, and Tambe 2013, the deender paces security resources on the edges e.g., streets, roads that ead to the target, instead o directy on the targets more concrete exampes are presented oowing the deinitions o the modes in the next section. In these cases, the deender strategy cannot be represented as coverage over the targets, and Coroary 2 is thus not appicabe. In this section, we present Φ or a genera Stackeberg game using a simiar idea that Φ or a compact game is obtained. This genera Φ appies to a security games derived rom Stackeberg games, which we exempiy in the next section. According to Eqs. 3 and 4, i two eader strategies x 1 and x 2 satisy U x 1, t i = U x 2, t i and U x 1, t i = U x 2, t i, i = 1,..., T, the oower woud respond with the same pure strategy according to U when they are payed in particuar, when there are mutipe optima pure x

4 strategies or the oower, he reers to U and aso has the same response and receive the same payo according to U ; and the oower s response woud induce the same eader payo; x 1 and x 2 are thus equivaent or both payers in terms o the payos induced. We write the above conditions as oows: x 1j u j = x 2j u j, where u j = U j1,..., U j T, U j1,..., U j T T is a 2 T - dimensiona vector. Thereore, i some strategy proie x, t i orms SSE, another strategy proie x, t i, such that x j u j = x j u j, aso orms SSE. This is equivaent to impementing the 2 T -dimensiona vector x j u j with the set o points {u 1,..., u } as their convex combination. Simiar to the anaysis in the ast section, according to the Carathéodory s theorem, there is aways an impementation where no more than 2 T +1 points have non-zero weights, which corresponds to an SSE strategy or the eader with a support o ess than 2 T + 1 pure strategies, namey, Φ = 2 T + 1 or a genera Stackeberg game. A Tighter Φ Deeper anaysis indicates that Φ = 2 T + 1 can be even tighter. To present the tighter Φ, we irst assume that there is ony one optima strategy or the oower, and we reax this assumption ater. In this case, or t- wo eader strategies x 1 and x 2, the oower responds with the same optima strategy i U x 1, t i = U x 2, t i, i = 1,..., T note that the condition U x 1, t i = U x 2, t i, i = 1,..., T is not necessary since there is no tie by assumption; and the eader receives the same payo i U x 1, t = U x 2, t, where t is the oower s optima strategy. Now given the SSE strategy proie x, t i, any strategy proie x, t i, such that x ju j = x j u j, 7 aso orms SSE, where u j1 j = U,..., U j T, U ji T. The rest is the same with the proo o the previous Φ, so that Φ = T + 2 given the assumption that there is ony one optima strategy or the oower. Next, we reax the assumption on the oower s optima strategies and show that the above concusion sti hods. We show that a strategy proie x, t i with x satisying E- q. 7 sti orms SSE. When the assumption is reaxed and the eader pays x, the oower may choose another pure strategy t i that is aso optima or him. There are oowing cases: 1 x, t i gives the eader the same payo as x, t i, then it is aso optima or the eader and satisies the SSE condition; 2 x, t i gives the eader a dierent payo, which is ater a impossibe because i it gives the eader a higher payo, then it is better than x, t i, which contradicts that x, t i orms SSE; i it gives the eader a ower payo, then the oower shoud not choose it because he break ties in avor o the eader. Thereore, x is the eader s optima strategy, a tighter Φ o T + 2 is obtained Coroary 3. Coroary 3. The minimum support size o the eader s SSE strategies in a genera Stackeberg game is T + 2, where T is the set o oower s pure strategies. Generaize Attacker Types: Φ or a Bayesian Stackeberg Game A Bayesian Stackeberg game aows mutipe types o eaders and oowers. Typicay, the eader type is restricted to one or the security game interest. The Bayesian Stackeberg games arise in scenarios where the eader has uncertain knowedge about dierent types o oowers she may ace Paruchuri et a. 2008; Jain, Kiekintved, and Tambe Athough Coroary 3 can be appied to a Bayesian Stackeberg game by using the Harsanyi transormation to transorm mutipe oowers to a singe oower Harsanyi and Seten 1972, the singe oower s pure strategy space is the cross product o each oower type s pure strategy set, which can be exponentiay arge. The Φ obtained may thus be meaningess. In the oows we present a tighter Φ or a Bayesian Stackeberg game, not appying Coroary 3 directy but using the same core idea. Let there be Λ types o oowers. A oower o type λ occurs with probabiity p λ and has a set T λ o pure s- trategies indexed by I λ = {1,..., T λ }. Given a strategy proie x, I, where x is the eader s mixed strategy, and I = i λ I 1 I Λ represents the indices o the oowers pure strategies, the expected payos or oower λ and the eader are deined respectivey as oows: U λ x, I = x j U ji λ λ, 8 U Λ x, I = λ Λ p λ x j U ji λ, 9 where U ji λ λ and U ji λ are respectivey the payos or oower λ and the eader when they choose pure strategies s j S and t iλ T λ. Given an SSE strategy proie x, I, where I = i λ, x, I aso orms SSE i x satisy the oowing equation which is a variant o Eq. 10: x ju λj = x j u λj, λ Λ, 10 where u j1 λj = Uλ,..., U j T λ λ, U ji λ T is speciied or each type o oowers. Obviousy, each oower makes identica responses under x and x according to Eq. 8, and the eader receives the same expected payo according to Eq. 9. Combining u λj or a λ Λ makes a vector o dimension λ Λ T λ + 1. By appying the Carathéodory s theorem, Φ = λ Λ T λ is then obtained or a Bayesian Stackeberg game Coroary 4. Coroary 4. The minimum support size o the eader s SSE strategies in a Bayesian Stackeberg game is λ Λ T λ , where T λ is the pure strategy set o oower type λ.

5 Φ or Other Stackeberg Security Games In this section, we review other types o Stackeberg security game modes discussed in the iterature and appy Coroary 3 to these security game modes. Mutipe Protection Types or a Target In some rea-word scenarios, it makes a dierence when d- ierent number or types o security resources are assigned to a target. For exampe, an attacker woud be more ikey captured at a target protected by ten security guards than one that is protected by ony one guard. The deender is abe to execute a variety o security activities on each target. Each activity π requires m π security resources and provides d- ierent payos U π d t i and U π a t i when it is executed on target i and the attacker attacks this target. For exampe, as shown in Tabe 1, the deender can execute three activities {π 0, π 1, π 2 }, where π k assigns k security guards on a target. Assigning more security guards on a target provides a higher/ower payo or the deender/attacker. The deender s pure strategy is thus an assignment o a m avaiabe security resources to execute activities on the n targets, which is more compex than a 0/1 vector. Furthermore, we can construct a counter exampe as oows, which impies that the game cannot be represented through a coverage vector. Suppose the attacker attacks target 1, and the deender executes π 0 and π 2 on target 1 with probabiity 0.5 or each, the expected payos or both payers are 10 and 5, respectivey; however, by executing π 1 on target 1 with probabiity 1.0, the same coverage rate can be attained, whie the payos or the payers, being 20 and 15 respectivey, are dierent rom the previous case. π 0 π 1 π 2 t 1-10, 30 20, , -20 t 2-15, 40 20, , -15 Tabe 1: Mutipe protection types or each target each entry shows the deender s/attacker s payo. Despite o the more compex deender strategy, the number o attacker s pure strategies, being equa to the number n o targets, remains unchanged as compared with the compact game mode. Appying Coroary 3, we obtain Φ = n + 2. A Network-based Security Game In a network-based game mode Washburn and Wood 1995; Tsai et a. 2010; Jain et a. 2011; Jain, Conitzer, and Tambe 2013, a deender takes action on a graph G = V, E with a set V o nodes and a set E o edges. The attacker is abe to start at a node s S V and traves through a path P in an attempt to reach one o the targets t T V. The deender paces security resources on the edges, instead o directy on the targets, to capture the attacker. I an edge is covered by a resource, and the attacker traves through this edge, the attacker is captured; otherwise, the attacker traves through this edge successuy. Thereore, the deender s pure strategy is an aocation o resources on the edges denoted by the s e 1 e 2 t a Coverage over targets s e 1 e 2 e 3 e 4 b Coverage over edges Figure 2: Counter exampes where coverage vectors do not make sense. set L o covered edges; the attacker s pure strategy is an s-t path P rom a start node to a target node. Denote the set o easibe deender and attacker pure strategies as L and P, respectivey. The network-based security game cannot be represented through a coverage vector over the targets. A counter exampe is shown in Figure 2a. I the deender has one resource and pays a mixed strategy with 0.5 probabiity or each o the pure strategies {0, 1} i.e., pacing one resource on e 1 and no resource on e 2 and {1, 0}, then a coverage o 0 is induced since the target is not covered by neither o the pure strategies, but the attacker has 0.50 chance o being caught no matter which path he chooses. Furthermore, a coverage vector over the edges does not make sense, either. This is shown by a counter exampe in Figure 2b. I the deender has two resources and pays {1, 0, 1, 0} and {0, 1, 0, 1} with 0.5 probabiity or each, a coverage vector o 0.5, 0.5, 0.5, 0.5 T over the edges is induced, which is the same with paying {1, 1, 0, 0} and {0, 0, 1, 1} with 0.50 probabiity or each. However, the attacker wi aways be caught under the ormer deender strategy whie he has 0.50 chance o not being caught under the atter one no matter which path he chooses. By appying Coroary 3, Φ = P + 2 is obtained or a network-based security game. Speciicay, in a networkbased security game, P can be very arge, such that P + 2 > L, which corresponds to the case where the vertex number i.e., L o a convex hu is even smaer than the dimension i.e., P + 2 o the space. Since obviousy the support size cannot be arger than the number o pure strategies, a more accurate Φ is min{ P + 2, L }. Note that this specia case is not discussed when we obtain the previous Φs because the pure strategy set o the deender is more ikey to be much arger than that o the attacker. Concusion In this paper, we anayze the structure o the deender s s- trategy in a number o widey studied security games and provides Φ or these games. Φ = T + 2 is obtained or a genera orm two-payer Stackberg game, and more generay Φ = λ Λ T λ or a Bayesian Stackeberg game. Apparenty, Φ depends ony on the oower s pure strategy space, so that the support o the deender s SSE s- trategy can be bounded very tighty when the pure strategy space o the attacker is drasticay smaer than that o the deender. This happens in the compact game mode, and the mode with mutipe protection types or each target. When t

6 the attacker s pure strategy space is even arger than the deender s, which may happen in a network-based game, Φ degenerates to the tota number o deender s pure strategies. Reerences An, B.; Jain, M.; Tambe, M.; and Kiekintved, C. 2011a. Mixed-initiative optimization in security games: A preiminary report. In AAAI Spring Symposium: Hep Me Hep You: Bridging the Gaps in Human-Agent Coaboration. An, B.; Pita, J.; Shieh, E.; Tambe, M.; Kiekintved, C.; and Marecki, J. 2011b. GUARDS and PROTECT: Next generation appications o security games. ACM SIGecom Exchanges 101: An, B.; Tambe, M.; Ordonez, F.; Shieh, E. A.; and Kiekintved, C. 2011c. Reinement o strong Stackeberg equiibria in security games. In Proceedings o the 25th AAAI Conerence on Artiicia Inteigence AAAI 11, An, B.; Kempe, D.; Kiekintved, C.; Shieh, E.; Singh, S.; Tambe, M.; and Vorobeychik, Y Security games with imited surveiance. Proceedings o the 26th AAAI Conerence on Artiicia Inteigence AAAI An, B.; Brown, M.; Vorobeychik, Y.; and Tambe, M Security games with surveiance cost and optima timing o attack execution. In Proceedings o the 12th Internationa Conerence on Autonomous Agents and Mutiagent Systems AAMAS 13, Basar, T.; Osder, G. J.; Csder, G.; Basar, T.; Baser, T.; and Osder, G. J Dynamic noncooperative game theory, voume 200. SIAM. Breton, M.; Aj, A.; and Haurie, A Sequentia Stackeberg equiibria in two-person games. Journa o Optimization Theory and Appications 591: Brown, M.; An, B.; Kiekintved, C.; Ordóñez, F.; and Tambe, M Muti-objective optimization or security games. In Proceedings o the 11th Internationa Conerence on Autonomous Agents and Mutiagent Systems AA- MAS 12, Danninger-Uchida, G Carathéodory theorem. In Foudas, C., and Pardaos, P., eds., Encycopedia o Optimization. Springer US Harsanyi, J. C., and Seten, R A generaized Nash soution or two-person bargaining games with incompete inormation. Management Science 185-Part-2: Jain, M.; Kardes, E.; Kiekintved, C.; Ordónez, F.; and Tambe, M Security games with arbitrary schedues: A branch and price approach. In Proceedings o the 24th AAAI Conerence on Artiicia Inteigence AAAI 10, Jain, M.; Korzhyk, D.; Vaněk, O.; Conitzer, V.; Pěchouček, M.; and Tambe, M A doube orace agorithm or zero-sum security games on graphs. In Proceedings o the 10th Internationa Conerence on Autonomous Agents and Mutiagent Systems AAMAS 11, Jain, M.; Conitzer, V.; and Tambe, M Security scheduing or rea-word networks. In Proceedings o the 12th Internationa Conerence on Autonomous Agents and Mutiagent Systems AAMAS 13, Jain, M.; Kiekintved, C.; and Tambe, M Quaitybounded soutions or inite Bayesian Stackeberg games: s- caing up. In Proceedings o the 10th Internationa Conerence on Autonomous Agents and Mutiagent Systems AA- MAS 11, Kiekintved, C.; Jain, M.; Tsai, J.; Pita, J.; Ordóñez, F.; and Tambe, M Computing optima randomized resource aocations or massive security games. In Proceedings o the 8th Internationa Conerence on Autonomous Agents and Mutiagent Systems AAMAS 09, Korzhyk, D.; Conitzer, V.; and Parr, R Compexity o computing optima Stackeberg strategies in security resource aocation games. In Proceedings o the 24th AAAI Conerence on Artiicia Inteigence AAAI 10, Leitmann, G On generaized stackeberg strategies. Journa o Optimization Theory and Appications 264: Paruchuri, P.; Pearce, J. P.; Marecki, J.; Tambe, M.; Ordonez, F.; and Kraus, S Paying games or security: an eicient exact agorithm or soving Bayesian Stackeberg games. In Proceedings o the 11th Internationa Conerence on Autonomous Agents and Mutiagent Systems AA- MAS 12, Pita, J.; Jain, M.; Marecki, J.; Ordóñez, F.; Portway, C.; Tambe, M.; Western, C.; Paruchuri, P.; and Kraus, S Depoyed ARMOR protection: the appication o a game theoretic mode or security at the Los Angees Internationa Airport. In Proceedings o the 7th Internationa Conerence on Autonomous Agents and Mutiagent Systems AA- MAS 08, Pita, J.; Tambe, M.; Kiekintved, C.; Cuen, S.; and Steigerwad, E GUARDS: game theoretic security aocation on a nationa scae. In Proceedings o the 10th Internationa Conerence on Autonomous Agents and Mutiagent Systems AAMAS 11, Shieh, E. A.; An, B.; Yang, R.; Tambe, M.; Badwin, C.; Di- Renzo, J.; Maue, B.; and Meyer, G PROTECT: An appication o computationa game theory or the security o the ports o the United States. In Proceedings o the 11th Internationa Conerence on Autonomous Agents and Mutiagent Systems AAMAS 12, Tsai, J.; Kiekintved, C.; Ordonez, F.; Tambe, M.; and Rathi, S Iris-a too or strategic security aocation in transportation networks. In Proceedings o the 8th Internationa Conerence on Autonomous Agents and Mutiagent Systems AAMAS 09, Tsai, J.; Yin, Z.; Kwak, J.-y.; Kempe, D.; Kiekintved, C.; and Tambe, M Urban security: game-theoretic resource aocation in networked physica domains. In Proceedings o the 9th Internationa Conerence on Autonomous Agents and Mutiagent Systems AAAI 10, Von Stenge, B., and Zamir, S Leadership with commitment to mixed strategies. Washburn, A., and Wood, K Two-person zero-

7 sum games or network interdiction. Operations Research 432: Yang, R.; Ordonez, F.; and Tambe, M Computing optima strategy against quanta response in security games. In Proceedings o the 11th Internationa Conerence on Autonomous Agents and Mutiagent Systems AA- MAS 12, Yin, Z., and Tambe, M A uniied method or handing discrete and continuous uncertainty in bayesian stackeberg games. In Proceedings o the 11th Internationa Conerence on Autonomous Agents and Mutiagent Systems AA- MAS 12,

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond

Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond AAAI Technical Report SS-12-03 Game Theory for Security, Sustainability and Health Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond Milind Tambe, Bo An Computer

More information

Security Games with Protection Externalities

Security Games with Protection Externalities Jiarui Gan The Key Laboratory of Intelligent Information Processing, ICT, CAS University of Chinese Academy of Sciences Beijing 100190, China ganjr@ics.ict.ac.cn Security Games with Protection Externalities

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Betting Strategies, Market Selection, and the Wisdom of Crowds

Betting Strategies, Market Selection, and the Wisdom of Crowds Betting Strategies, Market Seection, and the Wisdom of Crowds Wiemien Kets Northwestern University w-kets@keogg.northwestern.edu David M. Pennock Microsoft Research New York City dpennock@microsoft.com

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

Pricing Internet Services With Multiple Providers

Pricing Internet Services With Multiple Providers Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

Pricing and Revenue Sharing Strategies for Internet Service Providers

Pricing and Revenue Sharing Strategies for Internet Service Providers Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu

More information

Finance 360 Problem Set #6 Solutions

Finance 360 Problem Set #6 Solutions Finance 360 Probem Set #6 Soutions 1) Suppose that you are the manager of an opera house. You have a constant margina cost of production equa to $50 (i.e. each additiona person in the theatre raises your

More information

Scaling-Up Urban Network Security Games with Graph Contraction

Scaling-Up Urban Network Security Games with Graph Contraction Scaling-Up Urban Network Security Games with Graph Contraction Hiroaki Iwashita Kotaro Ohori Hirokazu Anai Fujitsu Laboratories Ltd. Kawasaki 211-8588, Japan {iwashita.hiroak,ohori.kotaro,anai}@jp.fujitsu.com

More information

Market Design & Analysis for a P2P Backup System

Market Design & Analysis for a P2P Backup System Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA seuken@eecs.harvard.edu Denis Chares, Max Chickering, Sidd Puri Microsoft

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

Maintenance activities planning and grouping for complex structure systems

Maintenance activities planning and grouping for complex structure systems Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe

More information

Cooperative Content Distribution and Traffic Engineering in an ISP Network

Cooperative Content Distribution and Traffic Engineering in an ISP Network Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering

More information

A New Statistical Approach to Network Anomaly Detection

A New Statistical Approach to Network Anomaly Detection A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit

More information

Game Theory for Security: Key Algorithmic Principles, Deployed Systems, Lessons Learned

Game Theory for Security: Key Algorithmic Principles, Deployed Systems, Lessons Learned Game Theory for Security: Key Algorithmic Principles, Deployed Systems, Lessons Learned Milind Tambe*, Manish Jain*, James Adam Pita*, Albert Xin Jiang* Abstract Security is a critical concern around the

More information

Journal of Economic Behavior & Organization

Journal of Economic Behavior & Organization Journa of Economic Behavior & Organization 85 (23 79 96 Contents ists avaiabe at SciVerse ScienceDirect Journa of Economic Behavior & Organization j ourna ho me pag e: www.esevier.com/ocate/j ebo Heath

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

Hybrid Selection of Language Model Training Data Using Linguistic Information and Perplexity

Hybrid Selection of Language Model Training Data Using Linguistic Information and Perplexity Hybrid Seection o Language Mode Training Data Using Linguistic Inormation and Antonio Tora Schoo o Computing Dubin City University Dubin, Ireand atora@computing.dcu.ie Abstract We expore the seection o

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Application-Aware Data Collection in Wireless Sensor Networks

Application-Aware Data Collection in Wireless Sensor Networks Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,

More information

ASYMPTOTIC DIRECTION FOR RANDOM WALKS IN RANDOM ENVIRONMENTS arxiv:math/0512388v2 [math.pr] 11 Dec 2007

ASYMPTOTIC DIRECTION FOR RANDOM WALKS IN RANDOM ENVIRONMENTS arxiv:math/0512388v2 [math.pr] 11 Dec 2007 ASYMPTOTIC DIRECTION FOR RANDOM WALKS IN RANDOM ENVIRONMENTS arxiv:math/0512388v2 [math.pr] 11 Dec 2007 FRANÇOIS SIMENHAUS Université Paris 7, Mathématiques, case 7012, 2, pace Jussieu, 75251 Paris, France

More information

Betting on the Real Line

Betting on the Real Line Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing

More information

Online Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations

Online Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations Onine Suppement for The Robust Network Loading Probem under Hose Demand Uncertaint: Formuation, Pohedra Anasis, and Computations Aşegü Atın Department of Industria Engineering, TOBB Universit of Economics

More information

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks

Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks Minimizing the Tota Weighted Competion Time of Cofows in Datacenter Networks Zhen Qiu Ciff Stein and Yuan Zhong ABSTRACT Communications in datacenter jobs (such as the shuffe operations in MapReduce appications

More information

Computing Game-Theoretic Solutions and Applications to Security

Computing Game-Theoretic Solutions and Applications to Security Computing Game-Theoretic Solutions and Applications to Security Vincent Conitzer Departments of Computer Science and Economics Duke University Durham, NC 27708, USA conitzer@cs.duke.edu Abstract The multiagent

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 Scaabe Muti-Cass Traffic Management in Data Center Backbone Networks Amitabha Ghosh, Sangtae Ha, Edward Crabbe, and Jennifer

More information

Uncertain Bequest Needs and Long-Term Insurance Contracts 1

Uncertain Bequest Needs and Long-Term Insurance Contracts 1 Uncertain Bequest Needs and Long-Term Insurance Contracts 1 Wenan Fei (Hartford Life Insurance) Caude Fuet (Université du Québec à Montréa and CIRPEE) Harris Schesinger (University of Aabama) Apri 22,

More information

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION Františe Mojžíš Department of Computing and Contro Engineering, ICT Prague, Technicá, 8 Prague frantise.mojzis@vscht.cz Abstract This

More information

Stackelberg Security Games for Security. Fernando Ordóñez Universidad de Chile

Stackelberg Security Games for Security. Fernando Ordóñez Universidad de Chile Stackelberg Security Games for Security Fernando Ordóñez Universidad de Chile Stackelberg Games for Security Fernando Ordóñez Universidad de Chile Stackelberg Games for Security Fernando Ordóñez Milind

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information

Scheduling in Multi-Channel Wireless Networks

Scheduling in Multi-Channel Wireless Networks Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA vartikab@acm.org, nhv@iinois.edu Abstract. The avaiabiity of mutipe orthogona

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

Pricing and hedging of variable annuities

Pricing and hedging of variable annuities Cutting Edge Pricing and hedging of variabe annuities Variabe annuity products are unit-inked investments with some form of guarantee, traditionay sod by insurers or banks into the retirement and investment

More information

INDUSTRIAL AND COMMERCIAL

INDUSTRIAL AND COMMERCIAL Finance TM NEW YORK CITY DEPARTMENT OF FINANCE TAX & PARKING PROGRAM OPERATIONS DIVISION INDUSTRIAL AND COMMERCIAL ABATEMENT PROGRAM PRELIMINARY APPLICATION AND INSTRUCTIONS Mai to: NYC Department of Finance,

More information

Oligopoly in Insurance Markets

Oligopoly in Insurance Markets Oigopoy in Insurance Markets June 3, 2008 Abstract We consider an oigopoistic insurance market with individuas who differ in their degrees of accident probabiities. Insurers compete in coverage and premium.

More information

Stackelberg Security Games (SSG) Basics and Application Overview

Stackelberg Security Games (SSG) Basics and Application Overview Stackelberg Security Games (SSG) Basics and Application Overview Bo An School of Computer Engineering Nanyang Technological University Singapore, 639798 boan@ntu.edu.sg Milind Tambe, Arunesh Sinha Computer

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

A Latent Variable Pairwise Classification Model of a Clustering Ensemble

A Latent Variable Pairwise Classification Model of a Clustering Ensemble A atent Variabe Pairwise Cassification Mode of a Custering Ensembe Vadimir Berikov Soboev Institute of mathematics, Novosibirsk State University, Russia berikov@math.nsc.ru http://www.math.nsc.ru Abstract.

More information

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective Load Baance vs Energy Efficiency in Traffic Engineering: A Game Theoretica Perspective Yangming Zhao, Sheng Wang, Shizhong Xu and Xiong Wang Schoo of Communication and Information Engineering University

More information

The Web Insider... The Best Tool for Building a Web Site *

The Web Insider... The Best Tool for Building a Web Site * The Web Insider... The Best Too for Buiding a Web Site * Anna Bee Leiserson ** Ms. Leiserson describes the types of Web-authoring systems that are avaiabe for buiding a site and then discusses the various

More information

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS 1 DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS 2 ASHER M. KACH, KAREN LANGE, AND REED SOLOMON Abstract. We show that if H is an effectivey competey decomposabe computabe torsion-free abeian group,

More information

Human Capital & Human Resources Certificate Programs

Human Capital & Human Resources Certificate Programs MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J

More information

A Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities

A Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities A Branch-and-Price Agorithm for Parae Machine Scheduing with Time Windows and Job Priorities Jonathan F. Bard, 1 Siwate Rojanasoonthon 2 1 Graduate Program in Operations Research and Industria Engineering,

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

The eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

eg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No

More information

Design and Analysis of a Hidden Peer-to-peer Backup Market

Design and Analysis of a Hidden Peer-to-peer Backup Market Design and Anaysis of a Hidden Peer-to-peer Backup Market Sven Seuken, Denis Chares, Max Chickering, Mary Czerwinski Kama Jain, David C. Parkes, Sidd Puri, and Desney Tan December, 2015 Abstract We present

More information

Breakeven analysis and short-term decision making

Breakeven analysis and short-term decision making Chapter 20 Breakeven anaysis and short-term decision making REAL WORLD CASE This case study shows a typica situation in which management accounting can be hepfu. Read the case study now but ony attempt

More information

Hedge Fund Capital Accounts and Revaluations: Are They Section 704(b) Compliant?

Hedge Fund Capital Accounts and Revaluations: Are They Section 704(b) Compliant? o EDITED BY ROGER F. PILLOW, LL.M. PARTNERSHIPS, S CORPORATIONS & LLCs Hedge Fund Capita Accounts and Revauations: Are They Section 704(b) Compiant? THOMAS GRAY Hedge funds treated as partnerships for

More information

Older people s assets: using housing equity to pay for health and aged care

Older people s assets: using housing equity to pay for health and aged care Key words: aged care; retirement savings; reverse mortgage; financia innovation; financia panning Oder peope s assets: using housing equity to pay for heath and aged care The research agenda on the ageing

More information

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS ASHER M. KACH, KAREN LANGE, AND REED SOLOMON Abstract. We show that if H is an effectivey competey decomposabe computabe torsion-free abeian group, then

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

Introduction the pressure for efficiency the Estates opportunity

Introduction the pressure for efficiency the Estates opportunity Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary

More information

This paper considers an inventory system with an assembly structure. In addition to uncertain customer

This paper considers an inventory system with an assembly structure. In addition to uncertain customer MANAGEMENT SCIENCE Vo. 51, No. 8, August 2005, pp. 1250 1265 issn 0025-1909 eissn 1526-5501 05 5108 1250 informs doi 10.1287/mnsc.1050.0394 2005 INFORMS Inventory Management for an Assemby System wh Product

More information

CLOUD service providers manage an enterprise-class

CLOUD service providers manage an enterprise-class IEEE TRANSACTIONS ON XXXXXX, VOL X, NO X, XXXX 201X 1 Oruta: Privacy-Preserving Pubic Auditing for Shared Data in the Coud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE Abstract With

More information

TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007.

TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007. This is the U.S. Socia Security Life Tabe, based on year 2007. This is avaiabe at http://www.ssa.gov/oact/stats/tabe4c6.htm. The ife eperiences of maes and femaes are different, and we usuay do separate

More information

The growth of online Internet services during the past decade has

The growth of online Internet services during the past decade has IEEE DS Onine, Voume 2, Number 4 Designing an Adaptive CORBA Load Baancing Service Using TAO Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

Intellectual property rights and foreign direct investment

Intellectual property rights and foreign direct investment Journa of Internationa Economics 56 (2002) 387 410 www.esevier.com/ ocate/ econbase Inteectua property rights and foreign direct investment Amy Joceyn Gass *, Kama aggi a, b a Department of Economics,

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

AA Fixed Rate ISA Savings

AA Fixed Rate ISA Savings AA Fixed Rate ISA Savings For the road ahead The Financia Services Authority is the independent financia services reguator. It requires us to give you this important information to hep you to decide whether

More information

Ricoh Healthcare. Process Optimized. Healthcare Simplified.

Ricoh Healthcare. Process Optimized. Healthcare Simplified. Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

MICROSOFT DYNAMICS CRM

MICROSOFT DYNAMICS CRM biztech TM MICROSOFT DYNAMICS CRM Experienced professionas, proven toos and methodoogies, tempates, acceerators and vertica specific soutions maximizing the vaue of your Customer Reationships Competency

More information

Pay-on-delivery investing

Pay-on-delivery investing Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

On General Laws of Complex Networks

On General Laws of Complex Networks On Genera Laws of Compex etwors Wenjun Xiao, Limin Peng, an ehrooz Parhami 3 Schoo of Software Engineering, South China University of Technoogy, Guangzhou 5064, P.R. China wjxiao@scut.eu.cn Department

More information

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services 2012 Before You Buy A Description of the Caifornia Partnership for Long-Term Care Prepared by the Caifornia Department of Heath Care Services Page 1 of 13 Ony ong-term care insurance poicies bearing any

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

Documents de Travail du Centre d Economie de la Sorbonne

Documents de Travail du Centre d Economie de la Sorbonne Documents de Travai du Centre d Economie de a Sorbonne Rationaizabiity and Efficiency in an Asymmetric Cournot Oigopoy Gabrie DESGRANGES, Stéphane GAUTHIER 2014.28 Maison des Sciences Économiques, 106-112

More information

Serving the Millennial Generation - The Challenge and Opportunity for Financial Services Companies

Serving the Millennial Generation - The Challenge and Opportunity for Financial Services Companies Serving the Miennia Generation - The Chaenge and Opportunity for Financia Services Companies May 2015 Christopher J. Perry, CFA Equity Research Anayst Today, the Miennia Generation (or Generation Y), broady

More information

Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games

Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games Dmytro Korzhyk, Vincent Conitzer, Ronald Parr Duke University, Durham, NC 27708, USA {dima, conitzer, parr}@cs.duke.edu

More information

Measuring operational risk in financial institutions

Measuring operational risk in financial institutions Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and

More information

Swingtum A Computational Theory of Fractal Dynamic Swings and Physical Cycles of Stock Market in A Quantum Price-Time Space

Swingtum A Computational Theory of Fractal Dynamic Swings and Physical Cycles of Stock Market in A Quantum Price-Time Space Swingtum A Computationa Theory of Fracta Dynamic Swings and Physica Cyces of Stock Market in A Quantum Price-Time Space Heping Pan Schoo of Information Technoogy and Mathematica Sciences, University of

More information

Structural Developments and Innovations in the Asset- Backed Commercial Paper Market

Structural Developments and Innovations in the Asset- Backed Commercial Paper Market Structura Deveopments and Innovations in the Asset- Backed Commercia Paper arket ark H. Adeson anaging Director, Asset-Backed Commercia Paper oody s Investors Service Strategic Research Institute 1997

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

Design of Follow-Up Experiments for Improving Model Discrimination and Parameter Estimation

Design of Follow-Up Experiments for Improving Model Discrimination and Parameter Estimation Design of Foow-Up Experiments for Improving Mode Discrimination and Parameter Estimation Szu Hui Ng 1 Stephen E. Chick 2 Nationa University of Singapore, 10 Kent Ridge Crescent, Singapore 119260. Technoogy

More information

Fast b-matching via Sufficient Selection Belief Propagation

Fast b-matching via Sufficient Selection Belief Propagation Fast b-matching via Sufficient Seection Beief Propagation Bert Huang Computer Science Department Coumbia University New York, NY 127 bert@cs.coumbia.edu Tony Jebara Computer Science Department Coumbia

More information

The Comparison and Selection of Programming Languages for High Energy Physics Applications

The Comparison and Selection of Programming Languages for High Energy Physics Applications The Comparison and Seection of Programming Languages for High Energy Physics Appications TN-91-6 June 1991 (TN) Bebo White Stanford Linear Acceerator Center P.O. Box 4349, Bin 97 Stanford, Caifornia 94309

More information

Infrastructure for Business

Infrastructure for Business Infrastructure for Business The IoD Member Broadband Survey Infrastructure for Business 2013 #5 The IoD Member Broadband Survey The IoD Member Broadband Survey Written by: Corin Tayor, Senior Economic

More information

Software Assistants for Randomized Patrol Planning for The LAX Airport Police and The Federal Air Marshals Service

Software Assistants for Randomized Patrol Planning for The LAX Airport Police and The Federal Air Marshals Service INTERFACES Vol. 00, No. 0, Xxxxx 0000, pp. 000 000 ISSN 0092-2102 EISSN 1526-551X 00 0000 0001 INFORMS DOI 10.1287/xxxx.0000.0000 c 0000 INFORMS Software Assistants for Randomized Patrol Planning for The

More information

A Framework to Decompose GSPN Models

A Framework to Decompose GSPN Models A Framework to Decompose GSPN Modes Leonardo Brenner, Pauo Fernandes, Afonso Saes, and Thais Webber Pontifícia Universidade Catóica do Rio Grande do Su, Av. Ipiranga, 6681 90619-900 Porto Aegre, Brazi

More information

Insertion and deletion correcting DNA barcodes based on watermarks

Insertion and deletion correcting DNA barcodes based on watermarks Kracht and Schober BMC Bioinformatics (2015) 16:50 DOI 10.1186/s12859-015-0482-7 METHODOLOGY ARTICLE Open Access Insertion and deetion correcting DNA barcodes based on watermarks David Kracht * and Steffen

More information

Subject: Corns of En gineers and Bureau of Reclamation: Information on Potential Budgetarv Reductions for Fiscal Year 1998

Subject: Corns of En gineers and Bureau of Reclamation: Information on Potential Budgetarv Reductions for Fiscal Year 1998 GAO United States Genera Accounting Office Washington, D.C. 20548 Resources, Community, and Economic Deveopment Division B-276660 Apri 25, 1997 The Honorabe Pete V. Domenici Chairman The Honorabe Harry

More information

Key Features of Life Insurance

Key Features of Life Insurance Key Features of Life Insurance Life Insurance Key Features The Financia Conduct Authority is a financia services reguator. It requires us, Aviva, to give you this important information to hep you to decide

More information

Income Protection Options

Income Protection Options Income Protection Options Poicy Conditions Introduction These poicy conditions are written confirmation of your contract with Aviva Life & Pensions UK Limited. It is important that you read them carefuy

More information

Oracle. L. Ladoga Rybinsk Res. Volga. Finland. Volga. Dnieper. Dnestr. Danube. Lesbos. Auditing Oracle Applications Peloponnesus

Oracle. L. Ladoga Rybinsk Res. Volga. Finland. Volga. Dnieper. Dnestr. Danube. Lesbos. Auditing Oracle Applications Peloponnesus N o r w e g i a n S e a White 60ûN ATLANTIC OCEAN UNITED KINGDOM Rio Douro Hebrid Bay of Biscay Garonne Faroe Isands Shetand Isands Orkney Isands North Loire ine Rhone Rhine Po Ebe Adriatic Batic Guf of

More information

A train dispatching model based on fuzzy passenger demand forecasting during holidays

A train dispatching model based on fuzzy passenger demand forecasting during holidays Journa of Industria Engineering and Management JIEM, 2013 6(1):320-335 Onine ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.699 A train dispatching mode based on fuzzy passenger demand

More information