Secure Smartcard-Based Fingerprint Authentication

Size: px
Start display at page:

Download "Secure Smartcard-Based Fingerprint Authentication"

Transcription

1 Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity of Illinois, Ubana-Champaign {kiyavash, ABSTRACT In this pape, the fundamental insecuities hampeing a scalable, wide-spead deployment of biometic authentication ae examined, and a cyptosystem capable of using fingepint data as its key is pesented. Fo ou application, we focus on situations whee a pivate key stoed on a smatcad is used fo authentication in a netwoked envionment, and we assume an attacke can launch off-line attacks against a stolen cad. Juels and Sudan s fuzzy vault is used as a stating point fo building and analyzing a secue authentication scheme using fingepints and smatcads called a fingepint vault. Fingepint minutiae coodinates m i ae encoded as elements in a finite field F and the secet key is encoded in a polynomial f(x) ove F [x]. The polynomial is evaluated at the minutiae locations, and the pais (m i, f(m i)) ae stoed along with andom (c i, d i) chaff points such that d i f(c i). Given a matching fingepint, a valid use can sepeate out enough tue points fom the chaff points to econstuct f(x), and hence the oiginal secet key. The paametes of the vault ae selected such that the attacke s vault unlocking complexity is maximized, subject to zeo unlocking complexity with a matching fingepint and a easonable amount of eo. Fo a featue location measuement vaiance of 9 pixels, the optimal vault is 69 times moe difficult to unlock fo an attacke compaed to a use posessing a matching fingepint, along with appoximately a 3% chance of unlocking failue. Suppoted by The Boeing Company unde Illinois Technology Challenge Gant Any opinions, findings, conclusions, o ecommendations expessed in this publication ae those of the authos and do not necessaily eflect the views of The Boeing Company o the State of Illinois. This wok was completed while T. Clancy was with the Electical and Compute Engineeing depatment at the Univesity of Illinois, Ubana-Champaign. Pemission to make digital o had copies of all o pat of this wok fo pesonal o classoom use is ganted without fee povided that copies ae not made o distibuted fo pofit o commecial advantage and that copies bea this notice and the full citation on the fist page. To copy othewise, to epublish, to post on seves o to edistibute to lists, equies pio speci c pemission and/o a fee. WBMA 3, Novembe 8, 3, Bekeley, Califonia, USA. Copyight 3 ACM /3/11...$5.. Categoies and Subject Desciptos E.3 [Data]: Data Encyption Keywods biometics, fingepint, smatcad, authentication 1. INTRODUCTION In ou inceasingly electonic envionment, eveything is becoming a netwok, fom the compute teminals we sit at, to the supemaket checkout, and even the locks on ou doos. In these abstact netwoks, all foms of authoization and access contol equie netwoks to have a secue method of authenticating uses. Smatcads offe a new paadigm fo authentication. Now, uses pivate keys ae stoed on smatcads. These uses can pove thei identity by using the cad to povide a coectly signed message to an authentication seve. Relying on the secuity of public-key authentication, the new task is to potect the pivate key on the smatcad itself. We believe that biometic authentication, in paticula fingepints, is a pactical method of poviding this potection. Thee ae two main appoaches fo using biometic infomation. The fist is fingepint matching, whee the smatcad stoes a template of the use s fingepint and equies the use to pesent a matching template befoe it will sign messages on the use s behalf. The second method is fingepint mapping, whee a fingepint is used to obscue the pivate key, without stoing a template. The pivate key can only be ecoveed and consequently used to sign an authentication message if a valid fingepint is povided. Fom a fundamental secuity standpoint, the key distinction between the two techniques is whethe a physical attack on the smatcad could yield any useful infomation. If the pivate key and biometic template ae both stoed unencypted on the smatcad, they would both be susceptible to a physical attack. The goal hee is to povide guaanteed secuity, athe than the illusion of secuity. This pape focuses on using a modified vesion of Juels and Sudan s fuzzy vault [1] temed the fingepint vault to encypt the pivate key on the smatcad using fingepint infomation, and deives theoetic bounds on its secuity. By analyzing the techniques used to pefom the authentication and the entopy of the biometic data used, the complexity of vaious attacks can be quantified. In all cases, thee is a tade-off between epoducibility and secuity. The oveall goals of this wok ae as follows: 1

2 smatcad digest, biodata signatue captue device teminal fingepint image auth equest Figue 1: Authentication Diagam define the fingepint vault scheme and its associated algoithms; pesent pobabilistic and systematic bounds on some of the vault paametes; define a class of unlocking techniques that can be used fo both attacks and by legitimate uses; and find the optimal fuzzy vault paamete choice to maximize attackes complexity and minimize uses complexity, while ensuing easonable epoducibility The emaining sections ae oganized as follows. Section two discusses backgound infomation and motivates the eseach. Section thee outlines pio simila eseach effots. Section fou pesents the fingepint vault and analyzes its applicability fom a pobabilistic sense. Section five analyzes the secuity of the fingepint vault fom a complexitytheoetic sense. Section six descibes empiical esults stemming fom sample fingepint data. Section seven concludes. Poofs ae povided in the appendix of the extended vesion found on the authos website.. BACKGROUND AND MOTIVATION An aipot is a motivating example whee a fingepint and smatcad solution is ideal. Passenges each have smatcads stoing thei pesonal infomation, including a pivate key. In ode to access the infomation on thei smatcad at ailine teminals, they must povide the smatcad with valid fingepint data. Fist, we pesent a simplified, geneic potocol fo use with smatcad-based biometic authentication. It is simila to those found in many popula public-key authentication schemes, such as SESAME [4, 16] and SSH [6]. In geneal, a seve should believe a use is who they say they ae if they can povide a signed message containing thei identity and a nonce o challenge (i.e. andom numbe) selected by the seve. If the public key associated with the specified identity coectly veifies the signatue, only the valid use could have sent it. If a cetificate is not povided by the use, the seve will need a database of public keys. Fom the client standpoint, signing ability is equied to authenticate. Figue 1 demonstates how this can be done with biometic data. Fist, a fingepint image is captued fom a scanne. This data is sent to a teminal which tanslates it into some smalle numeic epesentation, o template. Both the message digest we wish to sign and the biometic template ae sent to the smatcad. Povided the biometic data is valid, the smatcad will use its intenally stoed pivate key to geneate and etun a signatue fo the message digest. Ou analysis shall focus on the methods by which smatcads use biometic data to sign a message. This assumes the wost case scenaio: a smatcad has been stolen, and an attacke with complete physical access is attempting to etieve the pivate key. Given physical access, thee ae two main classes of physical attacks against smatcads: noninvasive o side-channel attacks, and invasive attacks. Thee of the most popula noninvasive attacks ae powe analysis [13], timing analysis [1], and electomagnetic (EM) analysis [1]. All of these attacks can be used to detemine sensitive infomation on a smatcad; howeve, noninvasive attacks can geneally be thwated by cleve algoithms, data obfuscation, and shielding techniques. Invasive attacks [14, 15] geneally involve dissolving the chip packaging and evese engineeing the pocesso itself. Given complete physical access, it is impossible to pevent an attacke fom etieving data stoed in memoy. The only way to potect against such an attack is to encypt the contents of memoy using a key not stoed on the cad itself. Then, an attacke may etieve the data fom the cad, but it will be of no use. Potecting the smatcad now equies effots on two fonts. Fist, the smatcad pocesso itself must be designed such that it is immune to the vaious on-line side-channel attacks. Secondly, without a matching fingepint, an attacke should not be able to obtain any sensitive infomation fom the cad. In paticula, uses pivate keys must be stoed in an encypted fomat. This second font is the focus of the wok pesented hee. 3. PAST WORK In the past few yeas, thee have been seveal eseach effots aimed at addessing the intesections between cyptogaphy and biometics. Hee we addess biometic cyptosystems in geneal, delve moe deeply in to the fuzzy vault, and then biefly examine vaious polynomial econstuction techniques. 3.1 Biometic Cyptosystems In 1998, Davida, et al. [6], wee among the fist to suggest off-line biometic authentication. It moved biometic data fom a cental seve into a signed fom on a potable stoage device, such as a smatcad. Thei system was essentially a PKI-like envionment that did local fingepint matching. Its main flaw is that it equied some local authentication authoity to have a key capable of decypting the template stoed on the stoage device. While they addess the key management issues, the basic pemise is still that of local fingepint matching, and is theefoe inheently insecue. The next yea thee wee thee innovative, yet simila methods that did not pefom biometic matching. The fist is the fuzzy commitment scheme [11]. Hee, a secet (pesumably a pivate key used fo late authentication) is encoded using a standad eo coecting code such as Hamming o Reed-Solomon, and then XOR-ed it with a biometic template. To etieve the secet, a slightly diffeent biometic template can again be XOR-ed, and the esult put though an eo coecting decode. Some small numbe of bit eos intoduced in the key can be coected though the decoding pocess. The majo flaw of this system is that biometic data is often subject to eodeing and easues, which cannot be handled using this simple scheme. In [19], a technique was poposed using the phase infomation of a Fouie tansfom of the fingepint image. The fin-

3 gepint infomation and a andomly chosen key ae mixed togethe to make it impossible to ecove one without the othe. In ode to toleate eos, the system used a filte that minimizes the output vaiance coesponding to the input images. To povide futhe edundancy, an encoding pocess stoes each bit multiple times. The wok does not addess how much these steps educe the entopy of the oiginal image; thus, it is not clea that thee exists a set of paametes which will allow the system to eliably ecognize legitimate uses while poviding a easonable amount of secuity. A thid pape [18] has a simila theoetical foundation to this wok, but aims towad a completely diffeent application. Hee, Monose, et al., attempt to add entopy to uses passwods on a compute system by incopoating data fom the way in which they type thei passwod. Since the biometic being used hee so so adically diffeent fom fingepints, thei esults ae not applicable to this wok. Recently, Juels and Sudan [1] poposed the fuzzy vault, a new achitectue with applications simila to Juels and Wattenbeg s fuzzy commitment scheme, but is moe compatible with patial and eodeed data. The fuzzy vault is used hee as a stating point fo the biometic scheme pesented in this pape. 3. Fuzzy Vault Hee, we descibe the oiginal fuzzy vault, with some slight notational diffeences. As with any cyptosystem, thee is some message m that needs to be encypted, o in this case locked. Some symmetic fuzzy key can be used to accomplish this task, and then used again late to decypt, o unlock the oiginal message. Hee, ou message m is fist encoded as the coefficients of some degee k polynomial in x ove a finite field F q. This polynomial f(x) is now the secet to potect. The locking set L is a set of t values l i F q making up the fuzzy encyption key, whee t > k. The locked vault contains all the pais (l i, f(l i)) and some lage numbe of chaff points (α j, β j), whee f(α j) β j. Afte adding the chaff points, the total numbe of items in the vault is. In ode to cack this system, an attacke must be able to sepaate the chaff points fom the legitimate points in the vault. The difficulty of this opeation is a function of the numbe of chaff points, among othe things. A legitimate use should be able to unlock the vault if they can naow the seach space. In geneal, to successfully intepolate the polynomial they have an unlocking set U of t elements such that L U contains at least k + 1 elements To summaize the vault paametes: f(x) is a degee k polynomial in F q[x] t k points in L intepolate though f(x) t is total numbe of points in the vault This vault shall be efeed to as V(F q,, t, k). Spuious polynomials of degee k intepolated by t points may show up in the andomly selected chaff points. In [1], the authos pesent a lemma descibing the secuity of thei scheme based on the numbe of these polynomials that exist in a vault with geneal paametes. Lemma 1. Fo evey µ >, with pobability 1 µ, a vault of size t contains at least µ 3 qk t (/t) t polynomials f (x) of degee less than k such that the vault contains exactly t points of the fom (x, f (x)). 3.3 Polynomial Intepolation In ode to actually econstuct the secet locked within the fuzzy vault, the points in the unlocking set must be used to intepolate a polynomial. The unlocking set will contain both eal points and chaff points. The simplest mechanism fo ecoveing the polynomial is a bute-foce seach, whee vaious k+1 element subsets of the unlocking set ae used to intepolate a degee k polynomial, using Newtonian Intepolation [8]. A second method is to use a Reed-Solomon decode [3], as suggested by Juels and Sudan. While RS codes ae taditionally used to coect eos in messages tansmitted ove noisy channels, they ae essentially a genealization of the polynomial econstuction poblem. Using a (t, k) code, t points can be fed into the decode, and the degee k polynomial will be etuned. Thee ae two main RS decoding algoithms: the Belekamp- Massey algoithm [17], and the Guuswami-Sudan algoithm [7]. Belekamp-Massey equies k+t eal points in the unlocking set while Guuswami-Sudan only equies kt. Un- fotunately, this exta eo coecting capability equies significantly moe computation. Inteestingly enough, the two algoithms povide nealy identical unlocking complexities fo a wide ange of vault paametes, so we shall focus on the Belekamp-Massey method. Anothe field called noisy polynomial intepolation has had some ecent advances, notably by Aoa and Khot [] and Bleichenbache and Nguyen [5]. Howeve, the esults of this wok ae not applicable to the fuzzy vault. In [], they examine the poblem of finding all polynomials that intepolate though the points (x i, [y i δ, y i + δ]). The noise in ou points has been emoved by the existence of the fuzzy vault, so this is not useful to us. In [5], they look at the poblem of intepolating the points (x i, y i,1), (x i, y i,),..., but since we do not have chaff points ovelapping with eal points, thei new algoithm is also not applicable. 4. FINGERPRINT VAULT In this section, we descibe ou modified fingepint vault, and the algoithms used to lock and unlock data. Additionally, theoetic bounds on ou ability to successfully unlock the vault ae detemined. 4.1 Genealized Fuzzy Vault Fist, the fuzzy vault specifies that the size of the locking set, unlocking set, and RS codewods ae all the same size. Hee, we loosen this estiction. t is the numbe of points in L τ is the numbe of points in U n is the RS codewod size In [1], the authos conside the case whee L and U ae taken fom discete sets, howeve fo biometic puposes these values ae not discete (o ae taken fom a sufficiently high-esolution discete set). Hence, fo all the elements in U, we need to find the closest elements in vault, and then ty unlocking with those values. Consequently, a quantization poblem is intoduced. How closely can we pack chaff points and still maintain a easonable pobability of quantization eo? The key being used to lock ou fuzzy vault is pixel coodinate locations, (x i, y i), of featues on a fingepint image. 3

4 Consequently, and ideal field fo the vault is F p, such that p is pime. Lemma 1 pobabilistically gives us the numbe of spuious polynomials of a paticula degee in ou vault. The pesence of many such polynomials is the key to poof of secuity in [1]. Unfotunately, fo easonable vault paametes (see Section 6), thee exists a δ with k δ t such that the expected numbe of spuious degee k polynomials intepolated by moe than δ points is less than one. The consequence is that the bute-foce seach fo a degee k polynomial intepolating δ points will yield a unique esult, namely, the vault secet. The pecise value of δ such that the esults of an unlocking attempt can be veified will be equied late: Coollay 1. A value of δ satisfying the above equiement is log 1 3 δ pk (1) log kp Howeve, an attacke will still have to seach though the space of possible polynomials. We will show in Section 5 that this complexity can still be fomidable. Fist, howeve, we will define ou algoithms. 4. Featue Extaction Featue extaction has been the focus of much eseach in past yeas, and this pape does not addess it in detail. Fo the tests pefomed in this pape, the VeiFinge toolkit fom Neuotechnologija Ltd. [5] was used to extact fingepint featues. The featue extaction pocess is visually epesented in Figue. In (a), one can see an image scan of a fingepint. This is eceived diectly fom the fingepint captue device. Vaious edge detection algoithms ae then used to convet that infomation into (b). This figue featues a cleaned-up vesion of the oiginal scan. Fom thee, featues can be eadily identified, as in (c). Each identified ae in (c) epesents a fingepint minutiae, which is a location whee a fingepint idge eithe splits o ends. Hee, we shall conside the featue extaction and alignment as a black box, yielding nomalized (x, y) pixel coodinates of fingepint minutiae. The outputs fom the black box fo seveal scans of the same finge ae geneally close to one anothe, unless the fingepint image was seveely clipped. The inta-scan vaiance imposes limitations on ou system. 4.3 Featue Noise Each peson s fingepint consists of a fixed set of minutiae locations m i = (x i, y i) M. Howeve, due to systematic eos in image captue, pocessing, and alignment, noise is added to each point, such that ou final points ae m i = (x i + n xi, y i + n yi) Additionally, the pocessing noise may discad featues o add additional featues that ae not pesent on the actual fingepint. The next step in the analysis is to deive a model fo the noise intoduced by the captue device and extaction algoithms. Fom this infomation, we can deive matching eo pobabilities. To simplify analysis, an additive Gaussian noise model will be assumed Figue 3: Plot of minutiae fom 5 scans of the same peson, with eliable egions maked To estimate the distibution on the minutiae locations, statistical data is needed. To accomplish this, featues wee extacted fom N sample fingepint images of the same peson, and then aligned. The data used hee was associated using the bounded neaest neighbo aveaging technique descibed in the next section. The esult is a set of expected values ( x i, ȳ i) fo each detected minutiae, the numbe n N of samples having a minutiae in that neighbohood, and the vaiance and covaiance of those n minutiae, (σ x,i, σ y,i, ρ i). Figue 3 shows these egions whee featues eliably appea. These values will be used late to compute a bound on the possible density of chaff points fo a given quantization eo pobability. 4.4 Locking Set The locking set L is computed in a method simila to the method fo finding minutiae vaiances. A use s finge is scanned and pocessed N times, esulting in N sets of minutiae, b 1,..., b N. These ae coelated using the following algoithm with distance theshold T and multiplicity theshold S: 1. let A be the set of aveage points with multiplicity. fo each minutiae set b i 3. fo each minutiae m j b i 4. find element in n k A such that n k m j < T 5. select closest n k that has not aleady been used 6. if no matches, add m j to A with multiplicity one 7. else add m j to aveage and incease multiplicity 8. A = {a A : multiplicity(a) > S} Featues appeaing in S o fewe scans ae discaded as noise. These points geneally occu in the edge egions of the image, whee featue extaction is less eliable. This locking set can then be used to ceate the fingepint vault. 4.5 Chaff Points The numbe and location of chaff points is limited by the vaiance in the fingepint captuing and featue extaction algoithm. Chaff points cannot be placed too close to eal points, o they will cause quantization poblems. Given some acceptable distance d is found, chaff points can be 4

5 Figue : Featue Extaction Pocess: (a) oiginal image, (b) afte edge detection, (c) including featue points placed anywhee as long as they ae at least distance d fom any eal points. Additionally, thee is no eason to place chaff points next to each othe at any distance less than d, because an attacke can immediately ignoe them as unlikely candidates, as they ae so close togethe. Lemma. Given elements of F p have paiwise Euclidean distance no less than d, the total numbe of elements with packing density ρ is less than 4ρp d π P_eo.4 Random Packing Sample Data Optimal Packing The optimal packing technique fo cicles is using a hexagonal lattice, and has a packing density of ρ = π.91 3 [3]. Unfotunately, this density could neve be achieved, as we equie the locations of chaff points to look andom. If they all existed on a lattice, any discontinuities in the lattice patten would be the eal points. Points can be andomly packed by epeatedly selecting andom field elements and putting a chaff point thee if it is at least distance d fom all othe points. This yields a packing density of ρ.45, and is guaanteed to be andom. Anothe technique, andom close packing [9], could yield densities close to ρ.75, but these techniques have not been sufficiently studied in the two-dimensional case, and thei andomness has neve been quantified. Fo this esults to be useful, a minimum distance d between points needs to be computed in tems of the vault paametes. Hee, we make a simplifying assumptions which will slightly loosen ou bound, but yield simple esults: the noise distibution is spheically Gaussian, o the two axes ae independent and identically distibuted. Lemma 3. The pobability of successfully decoding a single point at distance at least d fom all othes using the maximum likelihood ule is ( ) d P s 1 exp () 8σ Theoem 1. The pobability of eo fo decoding points at least δ out of t points in the fuzzy vault V(F p,, t, k) is bounded below by P e ( ) t t exp i i=δ fo a given point vaiance σ. ) i ( )) t i ( ρp 1 exp ( ρp πσ πσ (3) vault_size Figue 4: Pobability of eo as a function of, using σ = 9 and p = 51, with vault paametes t = 4 and δ = 1, plotted with eo pobabilities using andom packing in sample data sets. Figue 4 shows the eo pobability as a function of the vault size fo the optimal and andomized packing methods. Also included is eo pobabilities fom actual fingepint data using the andom packing method. Fo each peson, five fingepint scans wee available. The fist fou wee used to ceate a vault, and the fifth was used to ty and unlock it. The plotted pobabilities epesent the faction of data sets that had enough tue points in the unlocking set to successfully unlock the fingepint vault. The expeimental esults ae quite close to the theoetical, which is impessive given ou simplified noise model. Note that this is the pobability of being able to successfully decode, and does not deal with the complexity of actually pefoming that decoding. 4.6 Unlocking Set The unlocking set U stats off initially as some set U of minutiae locations fom a single scan of the use s finge. To select the elements of the unlocking set, fo each point in U the use finds the closest point in the vault. If the fingepint captue pocess did not intoduce noise featues, we should have U L. Howeve, thee is some pobability that a minutiae will by chance be close to a chaff point than a tue point. Also, thee is a chance that U will contain 5

6 spuious minutiae which was not included in L. This is whee Reed-Solomon codes comes into play. Fo any n points, we can detemine the polynomial, o Reed- Solomon codewod in this case, if at least δ+n of those points ae coect. If n is easonably close to, then vey few attempts will be equied to compute the polynomial. 5. UNLOCKING COMPLEXITY Vault unlocking can be viewed in two contexts. The fist is the complexity of a valid use unlocking a vault with a matching fingepint image. One goal is to minimize this complexity. The second context is the complexity of an attacke without fingepint infomation tying to cack the vault. We wish to maximize this complexity while the attacke wishes to minimize it. Thee ae two obvious techniques fo unlocking the vault. The fist is the bute-foce method, o bf(, t, k), whee is the total numbe of points, t is the numbe of eal points, and k is the degee of the polynomial. Fo an attacke, and t ae the same as the ones in the vault paamete, howeve fo a valid use, is the size of thei unlocking set and t is the numbe of non-chaff points in that set. Theoem. The complexity of the bf(, t, k) poblem using a suitable δ to ensue a unique esult is C bf = ( t 1. δ)( δ) Example 1. Conside a vault ove F 51 with = 1 total points and t = 4 eal points ove a degee k = 8 polynomial. Unde Coollay 1, δ = 1. Using Theoem, the complexity of an attacke beaking the vault is appoximately 58 polynomial intepolations. Example. Conside the same vault, only a valid use intesects thei unlocking set with the vault to obtain = 3 points, t = of which ae eal points. With such a small vault, obviously δ = k + 1 = 9. Using Theoem, the complexity of a valid use unlocking the vault is appoximately 7 polynomial intepolations. The second example illustates that a bute-foce decoding algoithm is less than ideal a valid use. Anothe method of unlocking the vault is though the use of a Reed-Solomon decode. In the s(, t, n, δ) poblem,, t, and δ have the same meanings as befoe, and n is the size of the Reed- Solomon codewods involved. Theoem 3. The complexity of the s(, t, n, δ) poblem ove F p is C s = ( n ) min(n,t) i=max( n+δ,n +t) )( ) 1 t t n i i such that n satisfies δ n min(, t δ) and n (p 1). Coollay. The complexity of bf(, t, δ) = s(, t, δ, δ), o taking n = δ educes Reed-Solomon unlocking into a bute-foce unlocking. Coollay 3. Fo >> t, bf(, t, δ) s(, t, n, δ), fo all n δ, o unless an attacke can eliminate a significant numbe of chaff points of a locked vault, he o she can do no bette than a bute-foce attack. ( (4) Let s examine the pevious two examples in the context of Reed-Solomon decoding. Figue 5 illustates the complexity of a full-scale attack, an attack whee patial fingepint infomation is known, and a legitimate unlocking of the vault. We can see that depending on the elationship of and t, the optimal method fo unlocking the vault can change. By using a Reed-Solomon decode, a valid use can now unlock the vault in 1 o ties, while an attacke can still do no bette than a bute-foce attack. If an attacke is able to eliminate many of the chaff points, pesumably though side knowledge of some of the fingepint chaacteistics, finding the optimal attack now becomes moe inteesting. The minimum complexity is no longe one of the bounding cases. In this pape, we assume that we can choose chaff points in such a way as to confuse the attacke and foce him to conside all points. Fo the most pat we can disegad attacks whee an attacke can eliminate cetain chaff points based on the pobable minutiae configuations. Reseach [, 1, ] indicates that the pobability of two people having the same fingepint is appoximately Assuming fingepints ae equipobable, this coesponds to log (1 1 8 ) 65 bits of entopy. Thus, fo a complexity-theoetic attack, the minutiae entopy is sufficiently lage, thus tivializing attacks which take pobable minutiae configuations into account. This also indicates we could neve achieve moe than 65-bit secuity, egadless of vault paametes. 6. EMPIRICAL RESULTS Thoughout the pape, the tem easonable vault paametes has been used epeatedly. Hee, we use actual fingepint data to detemine what easonable is. Each of the vault paametes, p,, t, and k has limitations placed on it by the behavio of actual fingepint data. The locking and unlocking algoithms wee implemented in MATLAB, and sample fingepint data was used to test the eo pobabilities. Fou scans of the same individual wee used to ceate a vault, and a fifth used to ty and unlock it. The numbe of tue points in the unlocking sets fo these eal vaults was used to validate the statistical models. The field, F q, defines the undelying mechanics of ou entie system. Thoughout, we have been using F p, fo pime p. In geneal, we wish to epesent a featue pixel location. Fo the examples pesented so fa, p = 51 was used. This way, minutiae locations can be stoed in 16-bit numbes, and 51 1 = 63 = , a vey smooth numbe, yielding many choices fo the Reed-Solomon codewod size. Inceasing the fingepint image esolution and consequently the field size has little effect on the esulting secuity. As the esolution inceases, so does the minutiae vaiance, σ. These two paametes cancel one anothe out, making the undelying field selection based moe on convenience than secuity. The numbe of eal points, t, is the size of the locking set. The algoithm descibed ealie takes seveal scans of the same peson and locates minutiae that appea in two o moe of the scans. This algoithm was implemented in MATLAB and used to ceate vaious locking sets. Fo 5 scans of each peson and S = 1, we obtain locking sets which anged fom 5 to 6 points, with mean 38 and standad deviation 11. The degee of the polynomial the vault potects is bounded below by the amount of data we wish to encode in it. Each 6

7 bit complexity 7 65 bit complexity bit complexity Reed Solomon codewod size Reed Solomon codewod size Reed Solomon codewod size Figue 5: Log of complexity fo Reed-Solomon decoding as a function of codewod size; (a) complexity of full attack, s(1, 4, n, 1); (b) complexity of patial infomation attack, s(1, 4, n, 1); (c) complexity of legitimate unlocking, s(3,, n, 1). log complexity vault size () attack complexity unlocking complexity complexity gap Figue 6: Vault pefomance as a function of vault size, with k = 14, τ =, and t = 38 ove F 51 coefficient is an element of F 51, and can theefoe hold 15.9 bits of infomation. As a esult, a 18-bit key can be encoded using 9 coefficients, o in a degee 8 polynomial. Consequently, we shall conside k 8. The total numbe of points depends on the numbe of chaff points added to the vault, and is a function of the desied eo pobability. Figue 4 gave the pobabilities fo a paticula set of input values. Hee, we shall examine this tade-off in moe detail. Fist, examine how the vault pefoms as a function of its size. Figue 6 shows both the complexity of a nomal use, and the complexity of an attacke fo a vault with 38 eal points ove a degee 14 polynomial. We can see that as the total numbe of points inceases, so do both complexities. In ode to keep use complexity to a minimum, we shall select the lagest value of such that the use has zeo complexity. The othe key paamete that can be vaied to alte ou vault pefomance is k, the degee of ou polynomial. Figue 7(a) shows the attack complexities as a function of k. This complexity was computed by fist finding the maximum numbe of points such that the use has zeo complexity, and fom thee computing δ, the minimum numbe of points intepolating ou polynomial in ode to guaantee success. Using and δ, the difficulty of a bute-foce attack can be computed. Figue 7(b) is essentially a eality check on ou selection of τ, the size of ou unlocking set. Fo a given τ and k, eal fingepint data was again used to compute the pobability of successfully unlocking the vault. It can be seen that given τ =, appoximately to 3 pecent eo occus. Fom a use s pespective, this means that evey couple times they access thei smatcad, a second fingepint scan will be equied in ode to successfully unlock the vault. This seems easonable given that we expect that the false positive ate to be infinitesimally small. The coesponding cuve in 7(a) indicates that the maximum complexity is 69 fo k = 14. Consequently, ove F 51 we have detemined the optimal vault to be: polynomial: k = 14, δ = 17 chaff points: = 313, d = 1.7 attack complexity: CONCLUSION In this pape, we have consideed the pactical implications of using fingepint infomation to secue a smatcad. Because fingepints ae often inconsistent, we must esot of a fuzzy scheme fo stoing the secet key. We show that with eal-life paametes, it is impossible to ensue the secuity envisioned by Juels and Sudan. Howeve, we define a modified scheme called the fingepint vault, povide associated algoithms and a mechanism fo finding optimal vault paametes. Paametes ae povided which makes etieving the secet 69 times moe difficult fo the attacke than a legitimate use. Thee ae a couple ways by which secuity may be impoved. An obvious way is to use multiple fingepints to stoe a longe pivate key which could be hashed down to the appopiate length. Anothe way is to impove the detection and extaction algoithms so as to lowe σ, allowing us to pack in moe chaff points. 8. REFERENCES [1] Agawal, D., Achambeault, B., Rao, J., and Rohtagi, P. The em-side channel(s). Wokshop on Cyptogaphic Hadwae and Embedded Systems, CHES. 7

8 attack complexity 8 7 eo pobability polynomial degee polynomial degee Figue 7: Vault pefomance as a function of k and τ: (a) attack complexities as a function of k fo vaious τ; (b) decoding failue as a function of k fo vaious τ [] Aoa, S., and Khot, S. Fitting algebaic cuves to noisy data. ACM Symposium on Theoy of Computing, STOC. [3] Blahut, R. Algebaic Codes fo Data Tansmission. Cambidge Univesity Pess, 3. [4] Blahut, R. Modem Theoy: An Intoduction to Telecommunications. Cambidge Univesity Pess, pepint. [5] Bleichenbache, D., and Nguyen, P. Q. Noisy polynomial intepolation and noisy chinese emaindeing. Advances in Cyptology, EUROCRYPT. [6] Davida, G., Fankel, Y., and Matt, B. On enabling secue applications though off-line biometic identification. IEEE Symposium on Pivacy and Secuity, [7] Guuswami, V., and Sudan, M. Impoved decoding of eed-solomon and algebaic-geometic codes. Symposium on Foundations of Compute Science, FOCS [8] Hildeband, F. B. Intoduction to Numeical Analysis. McGaw-Hill, [9] Jaege, H., and Nagel, S. Physics of ganula states. Science 55, 154 (199). [1] Juels, A., and Sudan, M. A fuzzy vault scheme. ACM Confeence on Compute and Communications Secuity, CCS. [11] Juels, A., and Wattenbeg, M. A fuzzy commitment scheme. ACM Confeence on Compute and Communications Secuity, CCS [1] Koche, P. Timing attacks on implementations of diffie-helmman, sa, dss, and othe systems. Advances in Cyptology, CRYPTO [13] Koche, P., Jaffe, J., and Jun, B. Diffeential powe analysis. Advances in Cyptology, CRYPTO [14] Kuhn, M., and Andeson, R. Tampe esistance: A cautionay note. Wokshop on Electonic Commece, USENIX [15] Kummeling, O., and Kuhn, M. Design pinciples fo tampe-esistant smatcad pocessos. Wokshop on Smatcad Technology, USENIX [16] Looi, M., Ashley, P., Seet, L. T., Au, R., and Vandenwauve, M. Enhancing sesamev4 with smat cads. Intenational Confeence on Smatcad Reseach and Applications, CARDIS [17] Massey, J. L. Shift egiste synthesis and bch decoding. IEEE Tansactions on Infomation Theoy 15, 1 (1969), [18] Monose, F., Reite, M., and Wetzel, S. Passwod hadening based on keystoke dynamics. ACM Confeence on Compute and Communications Secuity, CCS [19] Nichols, R. K., Ed. ICSA Guide to Cyptogaphy. McGaw-Hill, 1999, ch. Biometic Encyption. [] Ostebeg, J., Pathasaathy, T., Raghavan, T., and Sclove, S. Development of a mathematical fomula fo the calculation of fingepint pobabilities based on individual chaacteistics. Jounal of the Ameican Statistical Association 7 (1977), [1] Pankanti, S., Pabhaka, S., and Jain, A. On the individuality of fingepints. IEEE Tansactions on PAMI 4 (), [] Sclove, S. The occuance of fingepint chaacteistics as a two-dimensional pocess. Jounal of the Ameican Statistical Association 74 (1979), [3] Steinhaus, H. Mathematical Snapshots, 3 ed. Dove, 199. [4] Vandenwauve, M., Govaets, R., and Vandewalle, J. Oveview of authentication potocols: Kebeos and sesame. IEEE Canahan Confeence on Secuity Technology 1997, pp [5] Veifinge. Neuotechnologija ltd. [6] Ylonen, T. Ssh secue login connections ove the intenet. Secuity Symposium, USENIX 1996, pp

9 A1. PROOFS Poof of Coollay 1: A value of δ satisfying the above equiement is log 1 3 δ pk (A1) log kp The equiement on the numbe of spuious polynomials can be ewitten as ( 1 ( ) ) δ log 3 p(k δ) <. (A) δ Afte expanding and eaanging, we have δ > log 1 3 pk log δp (A3) Unable to isolate the δ, on the ight hand side substitute k fo δ. In geneal, δ is lage than k, and the logaithm of the two is elatively close. Fo easonable vault paametes, this only inceases δ by appoximately.3, and eithe does not affect the esult o adds a small pobabilistic safety net. Poof of Lemma : Given elements of F p have paiwise Euclidean distance no less than d, the total numbe of elements with packing density ρ is less than 4ρp. d π The poblem educes to packing cicles within a ectangle. The squae of possible locations has aea p, and the cicles have aea ( ) d π. As a esult, the numbe of cicles is bounded above by ( ) p ρ = 4ρp (A4) (d/) π πd V(F p,, t, k) is bounded below by ( ) t ) i ( )) t i t P e exp ( ρp 1 exp ( ρp i πσ πσ i=δ fo a given point vaiance σ. (A7) The esult above is essentially a combination of the fist two lemmas. The vault is designed to allow some decoding eos, since thee ae t δ valid points available, any combination of at least δ successful decodings is necessay. Also note that we ae ignoing the pobability of an eo yielding anothe eal point, athe than a chaff points. The eal points used in the vault can be chosen to minimize the pobability of this event. The distance d is defined by the fist lemma as d 4ρp πt. Substituting fo d in the P s, we can compute P e as P e t i=δ which expands to the given expession. (A8) ( t ) i (Ps) i (1 P s) t i (A9) Poof of Theoem : The complexity of the bf(, t, k) poblem using a suitable δ to ensue a unique esult is C bf = ( )( t ) 1. δ δ The poof is a faily staight-fowad combinatoics agument. In the bute-foce method, we must find δ points that intepolate a degee k polynomial. Thee ae ( δ) sets of any δ points. Of those sets, ( t δ) will yield successful esults, as all δ points will exist on the degee k polynomial. The quotient of the two is the expected numbe of tials equied to open the vault. Poof of Lemma 3: The pobability of successfully decoding a single point at distance at least d fom all othes using the maximum likelihood ule is ( ) d P s 1 exp (A5) 8σ The success pobability is bounded below by integating the Gaussian of distance d/ fom its mean, a fequently made simplification in communication theoy [4]. Hee, we use pola integation on the multivaiate Gaussian distibution to compute the pobability. Consequently, the computation is P s π d/ which simplifies to the above expession. 1 /σ πσ e d dθ (A6) Poof of Theoem 1: The pobability of eo fo decoding points at least δ out of t points in the fuzzy vault Poof of Theoem 3: The complexity of the s(, t, n, δ) poblem ove F p is C s = ( n ) min(n,t) i=max( n+δ,n +t) ( )( ) 1 t t n i i (A1) such that n satisfies δ n min(, t δ) and n (p 1). The agument hee is simila to the poof fo bute-foce. We select and ty codewods of size n. Thee ae ( n) such codewod selections. The numbe of such codewods that succeed is a moe difficult question to answe. In geneal, ou Reed-Solomon code equies n+δ elements to successfully poduce the degee k polynomial intepolated n+δ by at least δ points. As a esult, t (o if is elatively small). Since n δ, the oveall condition on n is deived: δ n min(, t δ). How many sets of n points will succeed? Well, thee must be at least ν = n+δ eal points and no moe than n ν chaff points. Given we have i eal points whee ν i n, thee ae ( ( t n i) ways to choose the chaff points and t i) ways to 9

10 select the eal points. This esults in the summation ( )( ) min(n,t) t t. (A11) n i i i=max(ν,n +t) The additional constaints on i guaantee that we neve select moe chaff points o eal points than we actually have. Poof of Coollay : The complexity of bf(, t, δ) = s(, t, δ, δ), o taking n = δ educes Reed-Solomon unlocking into a bute-foce unlocking. Since δ t, the summation anges can be detemined: min(δ, ) = δ, max(δ, δ + t) = δ. Since the summation only opeates with i = δ, the combinations become ( t )( t δ to ( δ)( t δ) 1. ) ( = t ) δ. Thus, the oveall expession simplifies Poof of Coollay 3: Fo >> t, bf(, t, δ) s(, t, n, δ), fo all n δ, o unless an attacke can eliminate a significant numbe of chaff points of a locked vault, he o she can do no bette than a bute-foce attack. We wish to select an n, such that k n t k that minimizes C s. To do this, well shall expand the equation fo C, and examine the tems that most significantly contibute to the oveall complexity. Fist, fo >> t, the tems can be slightly simplified. ( ) C s = n min(n,t) i=(n+δ)/ ( )( ) t t 1 n i i Now, expanding the summation: ( ) (( )( ) n t (n δ)/ t (n + δ)/ (A1) + ) 1 (A13) Howeve, notice that we eally ae only inteested in the fist tem of the summation. Fo >> t, the fist combination is significantly lage than the second. Additionally, the second tem in the summation will be appoximately times smalle. As a esult, if we wite out the dominant tems: ( )( ) 1 t (A14) n (n δ)/ To minimize ou complexity, we wish to minimize the numeato and maximize the denominato. Howeve, these ae conflicting goals. Fotunately, the fist tem contibutes appoximately t times moe to the esult than the second tem. Consequently, to minimize ( n), select the smallest n possible. 1

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

UNIT CIRCLE TRIGONOMETRY

UNIT CIRCLE TRIGONOMETRY UNIT CIRCLE TRIGONOMETRY The Unit Cicle is the cicle centeed at the oigin with adius unit (hence, the unit cicle. The equation of this cicle is + =. A diagam of the unit cicle is shown below: + = - - -

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distibution A. It would be vey tedious if, evey time we had a slightly diffeent poblem, we had to detemine the pobability distibutions fom scatch. Luckily, thee ae enough similaities between

More information

Research Article A Reputation-Based Identity Management Model for Cloud Computing

Research Article A Reputation-Based Identity Management Model for Cloud Computing Mathematical Poblems in Engineeing Volume 2015, Aticle ID 238245, 15 pages http://dx.doi.og/10.1155/2015/238245 Reseach Aticle A Reputation-Based Identity Management Model fo Cloud Computing Lifa Wu, 1

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

Continuous Compounding and Annualization

Continuous Compounding and Annualization Continuous Compounding and Annualization Philip A. Viton Januay 11, 2006 Contents 1 Intoduction 1 2 Continuous Compounding 2 3 Pesent Value with Continuous Compounding 4 4 Annualization 5 5 A Special Poblem

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg

More information

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

Towards Automatic Update of Access Control Policy

Towards Automatic Update of Access Control Policy Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia

More information

An Analysis of Manufacturer Benefits under Vendor Managed Systems

An Analysis of Manufacturer Benefits under Vendor Managed Systems An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT

More information

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure Towads Realizing a Low Cost and Highly Available Datacente Powe Infastuctue Siam Govindan, Di Wang, Lydia Chen, Anand Sivasubamaniam, and Bhuvan Ugaonka The Pennsylvania State Univesity. IBM Reseach Zuich

More information

Review Graph based Online Store Review Spammer Detection

Review Graph based Online Store Review Spammer Detection Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA gwang26@uic.edu sxie6@uic.edu liub@uic.edu psyu@uic.edu

More information

Financial Planning and Risk-return profiles

Financial Planning and Risk-return profiles Financial Planning and Risk-etun pofiles Stefan Gaf, Alexande Kling und Jochen Russ Pepint Seies: 2010-16 Fakultät fü Mathematik und Witschaftswissenschaften UNIERSITÄT ULM Financial Planning and Risk-etun

More information

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses,

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses, 3.4. KEPLER S LAWS 145 3.4 Keple s laws You ae familia with the idea that one can solve some mechanics poblems using only consevation of enegy and (linea) momentum. Thus, some of what we see as objects

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS CONCEPUAL FAMEOK FO DEVELOPING AND VEIFICAION OF AIBUION MODELS. AIHMEIC AIBUION MODELS Yui K. Shestopaloff, is Diecto of eseach & Deelopment at SegmentSoft Inc. He is a Docto of Sciences and has a Ph.D.

More information

Mining Relatedness Graphs for Data Integration

Mining Relatedness Graphs for Data Integration Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

A Capacitated Commodity Trading Model with Market Power

A Capacitated Commodity Trading Model with Market Power A Capacitated Commodity Tading Model with Maket Powe Victo Matínez-de-Albéniz Josep Maia Vendell Simón IESE Business School, Univesity of Navaa, Av. Peason 1, 08034 Bacelona, Spain VAlbeniz@iese.edu JMVendell@iese.edu

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

Episode 401: Newton s law of universal gravitation

Episode 401: Newton s law of universal gravitation Episode 401: Newton s law of univesal gavitation This episode intoduces Newton s law of univesal gavitation fo point masses, and fo spheical masses, and gets students pactising calculations of the foce

More information

Supplementary Material for EpiDiff

Supplementary Material for EpiDiff Supplementay Mateial fo EpiDiff Supplementay Text S1. Pocessing of aw chomatin modification data In ode to obtain the chomatin modification levels in each of the egions submitted by the use QDCMR module

More information

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications JOURNL OF ECONOMICS ND FINNCE EDUCTION Volume 7 Numbe 2 Winte 2008 39 The Supply of Loanable Funds: Comment on the Misconception and Its Implications. Wahhab Khandke and mena Khandke* STRCT Recently Fields-Hat

More information

Real Time Tracking of High Speed Movements in the Context of a Table Tennis Application

Real Time Tracking of High Speed Movements in the Context of a Table Tennis Application Real Time Tacking of High Speed Movements in the Context of a Table Tennis Application Stephan Rusdof Chemnitz Univesity of Technology D-09107, Chemnitz, Gemany +49 371 531 1533 stephan.usdof@infomatik.tu-chemnitz.de

More information

Risk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation

Risk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation Risk Sensitive Potfolio Management With Cox-Ingesoll-Ross Inteest Rates: the HJB Equation Tomasz R. Bielecki Depatment of Mathematics, The Notheasten Illinois Univesity 55 Noth St. Louis Avenue, Chicago,

More information

Faithful Comptroller s Handbook

Faithful Comptroller s Handbook Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

Approximation Algorithms for Data Management in Networks

Approximation Algorithms for Data Management in Networks Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute

More information

Gravitational Mechanics of the Mars-Phobos System: Comparing Methods of Orbital Dynamics Modeling for Exploratory Mission Planning

Gravitational Mechanics of the Mars-Phobos System: Comparing Methods of Orbital Dynamics Modeling for Exploratory Mission Planning Gavitational Mechanics of the Mas-Phobos System: Compaing Methods of Obital Dynamics Modeling fo Exploatoy Mission Planning Alfedo C. Itualde The Pennsylvania State Univesity, Univesity Pak, PA, 6802 This

More information

4a 4ab b 4 2 4 2 5 5 16 40 25. 5.6 10 6 (count number of places from first non-zero digit to

4a 4ab b 4 2 4 2 5 5 16 40 25. 5.6 10 6 (count number of places from first non-zero digit to . Simplify: 0 4 ( 8) 0 64 ( 8) 0 ( 8) = (Ode of opeations fom left to ight: Paenthesis, Exponents, Multiplication, Division, Addition Subtaction). Simplify: (a 4) + (a ) (a+) = a 4 + a 0 a = a 7. Evaluate

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

2. TRIGONOMETRIC FUNCTIONS OF GENERAL ANGLES

2. TRIGONOMETRIC FUNCTIONS OF GENERAL ANGLES . TRIGONOMETRIC FUNCTIONS OF GENERAL ANGLES In ode to etend the definitions of the si tigonometic functions to geneal angles, we shall make use of the following ideas: In a Catesian coodinate sstem, an

More information

VISCOSITY OF BIO-DIESEL FUELS

VISCOSITY OF BIO-DIESEL FUELS VISCOSITY OF BIO-DIESEL FUELS One of the key assumptions fo ideal gases is that the motion of a given paticle is independent of any othe paticles in the system. With this assumption in place, one can use

More information

How Much Should a Firm Borrow. Effect of tax shields. Capital Structure Theory. Capital Structure & Corporate Taxes

How Much Should a Firm Borrow. Effect of tax shields. Capital Structure Theory. Capital Structure & Corporate Taxes How Much Should a Fim Boow Chapte 19 Capital Stuctue & Copoate Taxes Financial Risk - Risk to shaeholdes esulting fom the use of debt. Financial Leveage - Incease in the vaiability of shaeholde etuns that

More information

Attacking an obfuscated cipher by injecting faults

Attacking an obfuscated cipher by injecting faults Attacking an obfuscated ciphe by injecting faults Matthias Jacob mjacob@cs.pinceton.edu Dan Boneh dabo@cs.stanfod.edu Edwad Felten felten@cs.pinceton.edu Abstact We study the stength of cetain obfuscation

More information

Seshadri constants and surfaces of minimal degree

Seshadri constants and surfaces of minimal degree Seshadi constants and sufaces of minimal degee Wioletta Syzdek and Tomasz Szembeg Septembe 29, 2007 Abstact In [] we showed that if the multiple point Seshadi constants of an ample line bundle on a smooth

More information

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011 The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it.

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it. Candidates should be able to : Descibe how a mass ceates a gavitational field in the space aound it. Define gavitational field stength as foce pe unit mass. Define and use the peiod of an object descibing

More information

Timing Synchronization in High Mobility OFDM Systems

Timing Synchronization in High Mobility OFDM Systems Timing Synchonization in High Mobility OFDM Systems Yasamin Mostofi Depatment of Electical Engineeing Stanfod Univesity Stanfod, CA 94305, USA Email: yasi@wieless.stanfod.edu Donald C. Cox Depatment of

More information

Nontrivial lower bounds for the least common multiple of some finite sequences of integers

Nontrivial lower bounds for the least common multiple of some finite sequences of integers J. Numbe Theoy, 15 (007), p. 393-411. Nontivial lowe bounds fo the least common multiple of some finite sequences of integes Bai FARHI bai.fahi@gmail.com Abstact We pesent hee a method which allows to

More information

Semipartial (Part) and Partial Correlation

Semipartial (Part) and Partial Correlation Semipatial (Pat) and Patial Coelation his discussion boows heavily fom Applied Multiple egession/coelation Analysis fo the Behavioal Sciences, by Jacob and Paticia Cohen (975 edition; thee is also an updated

More information

Automatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring

Automatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1145-116 (006) Automatic Closed Caption Detection and Filteing in MPEG Videos fo Video Stuctuing Depatment of Compute Science and Infomation Engineeing National

More information

Modal Characteristics study of CEM-1 Single-Layer Printed Circuit Board Using Experimental Modal Analysis

Modal Characteristics study of CEM-1 Single-Layer Printed Circuit Board Using Experimental Modal Analysis Available online at www.sciencediect.com Pocedia Engineeing 41 (2012 ) 1360 1366 Intenational Symposium on Robotics and Intelligent Sensos 2012 (IRIS 2012) Modal Chaacteistics study of CEM-1 Single-Laye

More information

Patent renewals and R&D incentives

Patent renewals and R&D incentives RAND Jounal of Economics Vol. 30, No., Summe 999 pp. 97 3 Patent enewals and R&D incentives Fancesca Conelli* and Mak Schankeman** In a model with moal hazad and asymmetic infomation, we show that it can

More information

Dual channel closed-loop supply chain coordination with a reward-driven remanufacturing policy

Dual channel closed-loop supply chain coordination with a reward-driven remanufacturing policy Intenational Jounal of Poduction Reseach ISSN: -753 Pint 1366-588X Online Jounal homepage: http://www.tandfonline.com/loi/tps Dual channel closed-loop supply chain coodination with a ewad-diven emanufactuing

More information

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.

More information

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research RAIRO Rech. Opé. (vol. 33, n 1, 1999, pp. 29-45) A GOOD APPROXIMATION OF THE INVENTORY LEVEL IN A(Q ) PERISHABLE INVENTORY SYSTEM (*) by Huan Neng CHIU ( 1 ) Communicated by Shunji OSAKI Abstact. This

More information

Coordinate Systems L. M. Kalnins, March 2009

Coordinate Systems L. M. Kalnins, March 2009 Coodinate Sstems L. M. Kalnins, Mach 2009 Pupose of a Coodinate Sstem The pupose of a coodinate sstem is to uniquel detemine the position of an object o data point in space. B space we ma liteall mean

More information

Memory-Aware Sizing for In-Memory Databases

Memory-Aware Sizing for In-Memory Databases Memoy-Awae Sizing fo In-Memoy Databases Kasten Molka, Giuliano Casale, Thomas Molka, Laua Mooe Depatment of Computing, Impeial College London, United Kingdom {k.molka3, g.casale}@impeial.ac.uk SAP HANA

More information

College of Engineering Bachelor of Computer Science

College of Engineering Bachelor of Computer Science 2 0 0 7 w w w. c n u a s. e d u College of Engineeing Bachelo of Compute Science This bochue Details the BACHELOR OF COMPUTER SCIENCE PROGRAM available though CNU s College of Engineeing. Fo ou most up-to-date

More information

MATHEMATICAL SIMULATION OF MASS SPECTRUM

MATHEMATICAL SIMULATION OF MASS SPECTRUM MATHEMATICA SIMUATION OF MASS SPECTUM.Beánek, J.Knížek, Z. Pulpán 3, M. Hubálek 4, V. Novák Univesity of South Bohemia, Ceske Budejovice, Chales Univesity, Hadec Kalove, 3 Univesity of Hadec Kalove, Hadec

More information

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.

More information

A Hybrid DCT-SVD Video Compression Technique (HDCTSVD)

A Hybrid DCT-SVD Video Compression Technique (HDCTSVD) A Hybid - Video Compession echnique (H) ong, Lin; Rao, K.R. Abstact A new hybid - (H) video compession technique is poposed in this pape. Discete cosine tansfom () is widely used in video coding due to

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE

INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE 1 INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE ANATOLIY A. YEVTUSHENKO 1, ALEXEY N. KOCHEVSKY 1, NATALYA A. FEDOTOVA 1, ALEXANDER Y. SCHELYAEV 2, VLADIMIR N. KONSHIN 2 1 Depatment of

More information

883 Brochure A5 GENE ss vernis.indd 1-2

883 Brochure A5 GENE ss vernis.indd 1-2 ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

Carter-Penrose diagrams and black holes

Carter-Penrose diagrams and black holes Cate-Penose diagams and black holes Ewa Felinska The basic intoduction to the method of building Penose diagams has been pesented, stating with obtaining a Penose diagam fom Minkowski space. An example

More information

Lesson 7 Gauss s Law and Electric Fields

Lesson 7 Gauss s Law and Electric Fields Lesson 7 Gauss s Law and Electic Fields Lawence B. Rees 7. You may make a single copy of this document fo pesonal use without witten pemission. 7. Intoduction While it is impotant to gain a solid conceptual

More information

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter Evaluating the impact of and Vitualization Softwae Technologies on the RIT Datacente Chistophe M Butle Vitual Infastuctue Administato Rocheste Institute of Technology s Datacente Contact: chis.butle@it.edu

More information

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................

More information

Pessu Behavior Analysis for Autologous Fluidations

Pessu Behavior Analysis for Autologous Fluidations EXPERIENCE OF USING A CFD CODE FOR ESTIMATING THE NOISE GENERATED BY GUSTS ALONG THE SUN- ROOF OF A CAR Liang S. Lai* 1, Geogi S. Djambazov 1, Choi -H. Lai 1, Koulis A. Peicleous 1, and Fédéic Magoulès

More information

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors Appeaed in the ACM Java Gande 2000 Confeence, San Fancisco, Califonia, June 3-5, 2000 HBench:Java: An Application-Specific Benchmaking Famewok fo Java Vitual Machines Xiaolan Zhang Mago Seltze Division

More information